首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The asymptotic (M→∞) probability of symbol error Pe,m for M-ary orthogonal modulation in a Nakagami-m fading channel is given by the incomplete gamma function P(m, mx) where x=In 2/(Eb/N0) and Eb is the average energy per bit. For large signal-to-noise ratio this leads to a channel where the probability of symbol error varies as the inverse mth power of Eb/N0. These channels exist for all m⩾1/2. The special case of m=1 corresponds to Rayleigh fading, an inverse linear channel  相似文献   

2.
Expressions are obtained for specifying the optimal error probability (minimum Pe) thresholds λ01 and λ02 for the traditional and modified sign detectors, respectively. These thresholds are shown to depend on the parameters p, P1, and M where: M is the number of observations zi used in the test statistic; P1=P(H1 ) is the prior probability for hypothesis H1 that signal s1 is present and 1-P1 =P(H0) corresponds to the hypothesis H0 that signal s0 is present; and p=Pr{zi⩾0|H1} with s0=0 for the traditional sign detector and p=Pr{zi⩾λ|H1 }=Pr{zi<λ|H0} with λ =(s0+s1)/2 for the modified sign detector. The expressions for λ01 and λ02, are given explicitly, and shown to be independent of P1 for sufficiently large M. Optimal Pe versus M performance curves, corresponding to both versions of the sign detector, are obtained for a representative range of values for p and P1  相似文献   

3.
A statistical inference problem for a two-terminal information source emitting mutually correlated signals X and Y is treated. Let sequences Xn and Yn of n independent observations be encoded independently of each other into message sets MX and MY at rates R1 and R 2 per letter, respectively. This compression causes a loss of the statistical information available for testing hypotheses concerning X and Y. The loss of statistical information is evaluated as a function of the amounts R1 and R 2 of the Shannon information. A complete solution is given in the case of asymptotically complete data compression, R1, R2→0 as n→∞. It is shown that the differential geometry of the manifold of all probability distributions plays a fundamental role in this type of multiterminal problem connecting Shannon information and statistical information. A brief introduction to the dually coupled e-affine and m-affine connections together with e -flatness and m-flatness is given  相似文献   

4.
The author presents and analyzes burst error statistics of a soft-decision Viterbi decoder when the transmitted signal is encoded with the 313 (3, 1/2) or 31123 (5, 1/2) convolutional codes, modulated via coherent binary phase-shift keying (BPSK) for the additive white Gaussian noise (AWGN) channel, and subjected to slow and nonselective scintillation/fading modeled by the Nakagami-m distribution. These statistics were generated by Monte-Carlo simulations, and presented in terms of burst error length average and quantile (90 and 99%) statistics versus SNR (Eb/N0) parameterized by the fading intensity parameter m. The results indicate how Viterbi decoder burst error statistics vary with the fading/scintillation intensity m for Nakagami-m channels, and, consequently, provide information important to the design of interleaved or noninterleaved concatenated coding schemes for such channel environments  相似文献   

5.
A probability density function Pm(R1,R2,Δ) is presented for a narrowband noise process in which R1 and R2 are two envelope samples and Δ is the phase difference. For m=1 the process is Gaussian, but for m=2,3, etc., it is non-Gaussian. New second-order statistical properties are identified for it as well as the density function for the resulting envelope when a signal is added to the noise. These results are given, though the major concern is with the density of the phase difference Δ and the density of &thetas;, the response of an FM detector fed with the noise  相似文献   

6.
Sequential decoding based on an error criterion   总被引:3,自引:0,他引:3  
An analysis of sequential decoding is presented that is based on the requirement that a set probability error Pe be achieved. The error criterion implies a bounded tree or trellis search region: the shape of this is calculated for the case of a binary symmetric channel with crossover probability P and random tree codes of rate R. Since the search region is finite at all combinations of p and R below capacity, there is no cutoff rate phenomenon for any Pe>0. The decoder delay (search depth), the path storage size, and the number of algorithm steps for several tree search methods are calculated. These include searches without backtracking and backtracking searches that are depth- and metric-first. The search depth of the non-backtracking decoders satisfies the Gallager reliability exponent for block codes. In average paths searched, the backtracking decoders are much more efficient, but all types require the same peak storage allocation. Comparisons are made to well-known algorithms  相似文献   

7.
A fast algorithm for searching a tree (FAST) is presented for computing the distance spectrum of convolutional codes. The distance profile of a code is used to limit substantially the error patterns that have to be searched. The algorithm can easily be modified to determine the number of nonzero information bits of an incorrect path as well as the length of an error event. For testing systematic codes, a faster version of the algorithm is given. FAST is much faster than the standard bidirectional search. On a microVAX, d=27 was verified for a rate R=1/2, memory M=25 code in 37 s of CPU time. Extensive tables of rate R=1/2 encoders are given. Several of the listed encoders have distance spectra superior to those of any previously known codes of the same rate and memory. A conjecture than an R=1/2 systematic convolutional code of memory 2M will perform as well as a nonsystematic convolutional code of memory M is given strong support  相似文献   

8.
The normality of binary codes is studied. The minimum cardinality of a binary code of length n with covering radius R is denoted by K(n,R). It is assumed that C is an (n,M)R code, that is, a binary code of length n with M codewords and covering radius R. It is shown that if C is an (n,M)1 code, then it is easy to find a normal (n ,M)1 code by changing C in a suitable way, and that all the optimal (n,M)1 codes (i.e. those for which M=K(n,1)) are normal and their every coordinate is acceptable. It is shown that if C is an abnormal (n,M) code, then n⩾9, and an abnormal (9118)1 code which is the smallest abnormal code known at present, is constructed. Lower bounds on the minimum cardinality of a binary abnormal code of length n with covering radius 1 are derived, and it is shown that if an (n,M)1 code is abnormal, then M⩾96  相似文献   

9.
10.
The reliability function of a component whose lifetime is exponentially distributed with a known parameter λ>0 is R (t|λ)=exp (-λt). If an environmental effect multiplies the parameter by a positive factor η, then the reliability function becomes R(t|η,λ)=exp(-ηλt). The authors assume that η itself is random, and its uncertainty is described by a Dirichlet process prior D(α) with parameter α=MG0, where M>O represents an intensity of assurance in the prior guess, G0, of the (unknown) distribution of η. Under squared error loss, the Bayes estimator of R(t|η,λ) is derived both for the no-sample problem and for a sample of size n. Using Monte Carlo simulation, the effects of n, M, G0 on the estimator are studied. These examples show that: (a) large values of n lead to estimates where the data outweigh the prior, and (b) large values of M increase the contribution of the prior to the estimates. These simulation results support intuitive ideas about the effect of environment and lifetime parameters on reliability  相似文献   

11.
Two important structural properties of block M(=2' )-ary PSK modulation codes, linear structure and phase symmetry, are investigated. An M-ary modulation code is first represented as a code with symbols from the integer group SM-PSK=(0,1,2,---,M-1) under modulo-M addition. Then the linear structure of block M-PSK modulation codes over SM-PSK with respect to modulo- M vector addition is defined, and conditions are derived under which a block M-PSK modulation code is linear. Once the linear structure is developed, the phase symmetry of block M-PSK modulation codes is studied. In particular, a necessary and sufficient condition for a block M-PSK modulation code that is linear as a binary code to be invariant under 2h/180°M phase rotation, for 1⩽hl is derived. Finally, a list of short 8-PSK and 16-PSK modulation codes is given, together with their linear structure and the smallest phase rotation for which a code is invariant  相似文献   

12.
It is shown that for worst-case partial-band jamming, the error probability performance (for fixed Eb/NI) becomes worse with increasing M for (M>16). The asymptotic probability-of-error is not zero for any Eb/N I(>ln 2), but decreases inverse linearly with respect to it. In the fading case, the error-probability performance (for fixed Eb/N0) improves with M for noncoherent detection, but worsens with M for coherent detection. For large Eb/N0 the performance of the Rayleigh fading channel asymptotically approaches the same limit as the worst case partial-band jammed channel. However, for values of M at least up to 4096, the partial-band jammed channel does better. While it is unlikely that an M-ary orthogonal signal set with M>1024 will be used in a practical situation, these results suggest an important theoretical problem; namely, what signal set achieves reliable communication  相似文献   

13.
Ferreira  H.C. 《Electronics letters》1988,24(24):1477-1478
A rate R=1/3 coding scheme, comprising a time diversity delay line and an R=2/3 convolutional code, is investigated. The bit error rate performance of the scheme on a binary symmetric channel and a burst error channel is presented  相似文献   

14.
Analysis is made of the effects of Doppler on the error rate performance of a low data rate binary FSK frequency hopping receiver, employing a discrete Fourier transform (DFT) technique for baseband detection. Bit detection decision is made by locating the maximum of the DFT outputs which, in the frequency domain, are assumed to be separated by 1/T where T is the bit period. Both the worst case and average error performances are obtained and presented as a function of Eb/N0 for various values of M where Eb/N0 is the signal bit energy-to-noise density ratio and M is the degree of freedom associated with the Doppler uncertainty window. The E b/N0 degradation as a function of M is also presented  相似文献   

15.
Performance limits of coded multilevel differential PSK (MDPSK) in multipath Rayleigh fading channels are described. The simple Gaussian metric is assumed for reasons for practicality even though it is not the maximum likelihood. The channel cutoff rate, R0 of MDPSK is analyzed based on the metric. Account is taken of additive white Gaussian noise (AWGN), cochannel interference, and multipath channel delay spread. For the analysis of the spectrum efficiency of a cellular mobile radio system employing coded MDPSK, its service area is defined as the area in which, with a bit rate of R information bit/symbol (RR0), reliable communications are possible. Three optimal information bit rates are determined from the channel cutoff rate to minimize the required average signal energy per information bit-to-noise power spectral density ratio (Eb/N0) to maximize the tolerable r.m.s. delay spread τr.m.s. and to maximize the spectrum efficiency  相似文献   

16.
Tight bounds on the redundancy of Huffman codes   总被引:2,自引:0,他引:2  
A method for deriving optimal upper bounds on the redundancy of binary Huffman codes in terms of the probability p1 of the most likely source letter is presented. This method will be used to compute bounds for all p1⩾1/127, which were previously known only for a few special cases. Furthermore, the known optimal lower bound for binary Huffman codes is generalized to arbitrary code alphabets and some upper bounds for D-ary Huffman codes, 2⩽D<∞, are given, which are the tightest possible for all p1⩾1/2  相似文献   

17.
The loss in quantizing coded symbols in the additive white Gaussian noise (AWGN) channel with binary phase-shift keying (BPSK) or quadrature phase-shift keying (QPSK) modulation is discussed. A quantization scheme and branch metric calculation method are presented. For the uniformly quantized AWGN channel, cutoff rate is used to determine the step size and the smallest number of quantization bits needed for a given bit-signal-to-noise ratio (Eb/N0) loss. A nine-level quantizer is presented, along with 3-b branch metrics for a rate-1/2 code, which causes an Eb/N0 loss of only 0.14 dB. These results also apply to soft-decision decoding of block codes. A tight upper bound is derived for the range of path metrics in a Viterbi decoder. The calculations are verified by simulations of several convolutional codes, including the memory-14, rate-1/4 or -1/6 codes used by the big Viterbi decoders at JPL  相似文献   

18.
If C is a code, an orphan is a coset that is not a descendant. Orphans arise naturally in the investigation of the covering radius. Case C has only even-weight vectors and minimum distance of at least four. Cosets that are orphans are characterized, and then the existence is proved of a family of orphans of first-order Reed-Muller codes R(1, m). For m⩽5 all orphans of R(1, m) are identified  相似文献   

19.
Molecular-beam epitaxy has been used for the first time to fabricate np junctions in InSb grown onto p-type InSb (100) substrates. Diodes formed by the epitaxial growth of a silicon-doped layer on undoped homoepitaxial material exhibited a bulk generation-recombination-limited R0A value of 105 Ω cm2 and Dλpk * of 3×1012 cm Hz1/2 W-1 at liquid nitrogen temperature  相似文献   

20.
An upper bound on the redundancy of D-ary Huffman codes in terms of the probability p1 of the most likely source letter is provided. For large values of p1, the bound improves the one given by R.G. Gallager (1978). Additionally, some results known for the binary case (D=2) are extended to arbitrary D-ary Huffman codes. As a consequence, a tight lower bound that corrects a bound recently proposed by J.D. Golic and M.M. Obradovic (1987) is derived  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号