共查询到20条相似文献,搜索用时 62 毫秒
1.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1968,14(1):129-134
In a recent series of papers, [2]-[4] Schalkwijk and Kailath have proposed a block coding scheme for transmission over the additive white Gaussian noise channel with one-sided spectral densityN_{0} using a noiseless delayless feedback link. The signals have bandwidthW (W leq infty) and average powerbar{P} . They show how to communicate at ratesR < C = W log (1 + bar{P}/N_{0}W) , the channel capacity, with error probabilityP_{e} = exp {-e^{2(C-R)T+o(T)}} (whereT is the coding delay), a "double exponential" decay. In their scheme the signal energy (in aT -second transmission) is a random variable with only its expectation constrained to bebar{P}T . In this paper we consider the effect of imposing a peak energy constraint on the transmitter such that whenever the Schalkwijk-Kailath scheme requires energy exceeding abar{P}T (wherea > 1 is a fixed parameter) transmission stops and an error is declared. We show that the error probability is degraded to a "single exponential" formP_{e} = e^{-E(a)T+o(T)} and find the exponentE(a) . In the caseW = infty , E(a) = (a - 1)^{2}/4a C . For finiteW, E(a) is given by a more complicated expression. 相似文献
2.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1976,22(3):363-366
This article presents new tighter upper bounds on the rate of Gaussian autoregressive channels with linear feedback. The separation between the upper and lower bounds is small. We havefrac{1}{2} ln left( 1 + rho left( 1+ sum_{k=1}^{m} alpha_{k} x^{- k} right)^{2} right) leq C_{L} leq frac{1}{2} ln left( 1+ rho left( 1+ sum_{k = 1}^{m} alpha_{k} / sqrt{1 + rho} right)^{2} right), mbox{all rho} , whererho = P/N_{0}W, alpha_{l}, cdots, alpha_{m} are regression coefficients,P is power,W is bandwidth,N_{0} is the one-sided innovation spectrum, andx is a root of the polynomial(X^{2} - 1)x^{2m} - rho left( x^{m} + sum^{m}_{k=1} alpha_{k} x^{m - k} right)^{2} = 0. It is conjectured that the lower bound is the feedback capacity. 相似文献
3.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1986,32(5):706-709
Recently Kasami {em et al.} presented a linear programming approach to the weight distribution of binary linear codes [2]. Their approach to compute upper and lower bounds on the weight distribution of binary primitive BCH codes of length2^{m} - 1 withm geq 8 and designed distance2t + 1 with4 leq t leq 5 is improved. From these results, the relative deviation of the number of codewords of weightjleq 2^{m-1} from the binomial distribution2^{-mt} left( stackrel{2^{m}-1}{j} right) is shown to be less than 1 percent for the following cases: (1)t = 4, j geq 2t + 1 andm geq 16 ; (2)t = 4, j geq 2t + 3 and10 leq m leq 15 ; (3)t=4, j geq 2t+5 and8 leq m leq 9 ; (4)t=5,j geq 2t+ 1 andm geq 20 ; (5)t=5, j geq 2t+ 3 and12 leq m leq 19 ; (6)t=5, j geq 2t+ 5 and10 leq m leq 11 ; (7)t=5, j geq 2t + 7 andm=9 ; (8)t= 5, j geq 2t+ 9 andm = 8 . 相似文献
4.
Writing on dirty paper (Corresp.) 总被引:1,自引:0,他引:1
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1983,29(3):439-441
A channel with outputY = X + S + Z is examined, The stateS sim N(0, QI) and the noiseZ sim N(0, NI) are multivariate Gaussian random variables (I is the identity matrix.). The inputX in R^{n} satisfies the power constraint(l/n) sum_{i=1}^{n}X_{i}^{2} leq P . IfS is unknown to both transmitter and receiver then the capacity isfrac{1}{2} ln (1 + P/( N + Q)) nats per channel use. However, if the stateS is known to the encoder, the capacity is shown to beC^{ast} =frac{1}{2} ln (1 + P/N) , independent ofQ . This is also the capacity of a standard Gaussian channel with signal-to-noise power ratioP/N . Therefore, the stateS does not affect the capacity of the channel, even thoughS is unknown to the receiver. It is shown that the optimal transmitter adapts its signal to the stateS rather than attempting to cancel it. 相似文献
5.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1974,20(4):517-524
Letxi = {xi(t), 0 leq t leq T} be a process with covariance functionK(s,t) andE int_0^T xi^2(t) dt < infty . It is proved that for everyvarepsilon > 0 thevarepsilon -entropyH_{varepsilon}(xi) satisfies begin{equation} H_{varepsilon}(xi_g) - mathcal{H}_{xi_g} (xi) leq H_{varepsilon}(xi) leq H_{varepsilon}(xi_g) end{equation} wherexi_g is a Gaussian process with the covarianeeK(s,t) andmathcal{H}_{xi_g}(xi) is the entropy of the measure induced byxi (in function space) with respect to that induced byxi_g . It is also shown that ifmathcal{H}_{xi_g}(xi) < infty then, asvarepsilon rightarrow 0 begin{equation} H_{varepsilon}(xi) = H_{varepsilon}(xi_g) - mathcal{H}_{xi_g}(xi) + o(1). end{equation} Furthermore, ff there exists a Gaussian processg = { g(t); 0 leq t leq T } such thatmathcal{H}_g(xi) < infty , then the ratio betweenH_{varepsilon}(xi) andH_{varepsilon}(g) goes to one asvarepsilon goes to zero. Similar results are given for the rate-distortion function, and some particular examples are worked out in detail. Some cases for whichmathcal_{xi_g}(xi) = infty are discussed, and asymptotic bounds onH_{varepsilon}(xi) , expressed in terms ofH_{varepsilon}(xi_g) , are derived. 相似文献
6.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(2):395-403
For any(n, k, d) binary linear code, the Griesmer bound says thatn geq sum_{i=0}^{k-1} lceil d/2^{i} rceil , wherelceil x rceil denotes the smallest integergeq x . We consider codes meeting the Griesmer bound with equality. These codes have parametersleft( s(2^{k} - 1) - sum_{i=1}^{p} (2^{u_{i}} - 1), k, s2^{k-1} - sum_{i=1}^{p} 2^{u_{i} -1} right) , wherek > u_{1} > cdots > u_{p} geq 1 . We characterize all such codes whenp = 2 oru_{i-1}-u_{i} geq 2 for2 leq i leq p . 相似文献
7.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1975,21(4):453-458
For a nondecreasing distortion characteristicphi(cdot) and a given signalx(cdot) , the "cross correlation" function defined byR_{phi} (tau) triangleq int_{-infty}^{infty} phi[x(t)]x(t - tau) dt is shown to satisfy the inequalityR_{phi}(tau) leq R_{phi}(0) , for alltau , generalizing an earlier result of Richardson that requiredphi(cdot) to be continuous and strictly increasing. The methods of the paper also show that, under weak conditions, begin{equation} R_{phi,psi}(tau) triangleq int_{-infty}^{infty} phi[x(t)]psi[x(t - tau)] dt leq R_{phi,psi}(0) end{equation} whenpsi is strictly increasing andphi is nondecreasing. In the case of hounded signals (e.g., periodic functions), the appropriate cross correlation function is begin{equation} mathcal{R}_{phi,psi}(tau} triangleq lim_{T rightarrow infty} (2T)^{-l} int_{-T}^T phi[x(t)]psi[x(t - tau)] dt. end{equation} For this case it is shown thatmathcal{R}_{phi,psi} (tau) leq mathcal{R}_{phi,psi}(0) for any nondecreasing (or nonincreasing) distortion functionsphi andpsi . The result is then applied to generalize an inequality on correlation functions for periodic signals due to Prosser. Noise signals are treated and inequalities of a similar nature are obtained for ensemble-average cross correlation functions under suitable hypotheses on the statistical properties of the noise. Inequalities of this type are the basis of a well-known method of estimating the unknown time delay of an observed signal. The extension to nondecreasing discontinuous distortion functions allows the use of hard limiting or quantization to facilitate the cross correlation calculation. 相似文献
8.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1978,24(2):254-256
An upper bound is derived for the mean-square error involved when a non-band-limited, wide-sense stationary random processx(t) (possessing an integrable power spectral density) is approximated by a cardinal series expansion of the formsum^{infty}_{-infty}x(n/2W) sinc2W(t-n/2W) , a sampling expansion based on the choice of some nominal bandwidthW > 0 . It is proved thatlim_{N rightarrow infty} E {|x(t) - x_{N}(t)|^{2}} leq frac{2}{pi}int_{| omega | > 2 pi W}S_{x}( omega) d omega, wherex_{N}(t) = sum_{-N}^{N}x(n/2W) sinc2W(t-n/2W) , andS_{x}(omega) is the power spectral density forx(t) . Further, the constant2/ pi is shown to be the best possible one if a bound of this type (involving the power contained in the frequency region lying outside the arbitrarily chosen band) is to hold uniformly int . Possible reductions of the multiplicative constant as a function oft are also discussed, and a formula is given for the optimal value of this constant. 相似文献
9.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1985,31(5):602-606
A continuous time stationary channel with additive noise presented byY(t) = X(t) + Z(t) is considered, where{X(t)} and{Z(t)} are mutually independent stationary processes representing the channel input and the noise, respectively, and{Y(t)} represents the channel output. It is shown that, under some general assumptions, the mutual information between the input{ X(t); 0 leq t leq T } and the output{ Y(t); 0 leq t leq T } can be expressed in the formAT + B(T) with a constantA and a functionB(T) given in terms of the conditional mutual informations between the "past" and the "future" given the "present" of the output and the noise. It is also shown that the remainder termB(T) converges to a constant asT tends to infinity. 相似文献
10.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1969,15(2):287-295
The transmission of the linear sum ofm biphase modulated signals in a time intervalT is considered for an additive Gaussian white noise channel of bandwidthW . Previous analyses consider the case wherem leq n equiv 2WT . In this paper, the probability of error is derived form > n , a situation which arises when the channel bandwidth is insufficient to support the data rate. Two distinct problems are considered. In the first, termed uncoded transmission, allm signals are independently biphase modulated. It is shown, for this case, that if the channel signal-to-noise ratio increases linearly withn , the error probability can be made to go to zero approximately exponentially inn for any value ofm/n . In the second problem, termed ceded transmission, onlyk < m of the signals are independently modulated. (The remaining(m - k) signals carry redundant information.) By using a suboptimum receiver, it is shown that for a fixed channel signal-to-noise ratio the error probability goes to0 exponentially inn ifk/n is less than some numberC^{ast} . For high signal-to-noise ratio,C^{ast} is greater than1 , a situation which could not occur ifm leq n . 相似文献
11.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1969,15(4):440-444
Forf(t) a real-valued signal band-limited to- pi r leq omega leq pi r (0 < r < 1) and represented by its Fourier integral, upper bounds are established for the magnitude of the truncation error whenf(t) is approximated at a generic timet by an appropriate selection ofN_{1} + N_{2} + 1 terms from its Shannon sampling series expansion, the latter expansion being associated with the full band[-pi, pi] and thus involving samples off taken at the integer points. Results are presented for two cases: 1) the Fourier transformF(omega) is such that|F(omega)|^{2} is integrable on[-pi, pi r] (finite energy case), and 2)|F(omega)| is integrable on[-pi r, pi r] . In case 1) it is shown that the truncation error magnitude is bounded above byg(r, t) cdot sqrt{E} cdot left( frac{1}{N_{1}} + frac{1}{N_{2}} right) whereE denotes the signal energy andg is independent ofN_{1}, N_{2} and the particular band-limited signal being approximated. Correspondingly, in case 2) the error is bounded above byh(r, t) cdot M cdot left( frac{1}{N_{1}} + frac{1}{N_{2}} right) whereM is the maximum signal amplitude andh is independent ofN_{1}, N_{2} and the signal. These estimates possess the same asymptotic behavior as those exhibited earlier by Yao and Thomas [2], but are derived here using only real variable methods in conjunction with the signal representation. In case 1), the estimate obtained represents a sharpening of the Yao-Thomas bound for values ofr dose to unity. 相似文献
12.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1981,27(1):132-136
A randomized decision rule is derived and proved to be the saddlepoint solution of the robust detection problem for known signals in independent unknown-mean amplitude-bounded noise. The saddlepoint solutionphi^{0} uses an equaUy likely mixed strategy to chose one ofN Bayesian single-threshold decision rulesphi_{i}^{0}, i = 1,cdots , N having been obtained previously by the author. These decision rules are also all optimal against the maximin (least-favorable) nonrandomized noise probability densityf_{0} , wheref_{0} is a picket fence function withN pickets on its domain. Thee pair(phi^{0}, f_{0}) is shown to satisfy the saddlepoint condition for probability of error, i.e.,P_{e}(phi^{0} , f) leq P_{e}(phi^{0} , f_{0}) leq P_{e}(phi, f_{0}) holds for allf andphi . The decision rulephi^{0} is also shown to be an eqoaliir rule, i.e.,P_{e}(phi^{0}, f ) = P_{e}(phi^{0},f_{0}) , for allf , with4^{-1} leq P_{e}(phi^{0},f_{0})=2^{-1}(1-N^{-1})leq2^{-1} , N geq 2 . Thus nature can force the communicator to use an {em optimal} randomized decision rule that generates a large probability of error and does not improve when less pernicious conditions prevail. 相似文献
13.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(6):872-877
Winograd's result concerning Elias' model of computation in the presence of noise can be stated without reference to computation. If a codevarphi: {0,1}^{k} rightarrow {0,1}^{n} is min-preserving(varphi (a wedge b) = varphi (a) wedge varphi (b) fora,b in {0,1}^{k}) andepsilon n -error correcting, then the ratek/n rightarrow 0 ask rightarrow infty . This result is improved and extended in two directions. begin{enumerate} item For min-preserving codes with {em fixed} maximal (and also average) error probability on a binary symmetric channel againk/n rightarrow 0 ask rightarrow infty (strong converses). item Second, codes with lattice properties without reference to computing are studied for their own sake. Already for monotone codes( varphi (a) leq varphi (b) fora leq b) the results in direction 1) hold for maximal errors. end{enumerate} These results provide examples of coding theorems in which entropy plays no role, and they can be reconsidered from the viewpoint of multiuser information theory. 相似文献
14.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(2):385-388
LetV be an(n, k, d) binary projective geometry code withn = (q^{m}-1)/(q - 1), q = 2^{s} , andd geq [(q^{m-r}-1)/(q - 1)] + 1 . This code isr -step majority-logic decodable. With reference to the GF(q^{m}) = {0, 1, alpha , alpha^{2} , cdots , alpha^{n(q-1)-1} } , the generator polynomialg(X) , ofV , hasalpha^{nu} as a root if and only ifnu has the formnu = i(q - 1) andmax_{0 leq l < s} W_{q}(2^{l} nu) leq (m - r - 1)(q - 1) , whereW_{q}(x) indicates the weight of the radix-q representation of the numberx . LetS be the set of nonzero numbersnu , such thatalpha^{nu} is a root ofg(X) . LetC_{1}, C_{2}, cdots, C_{nu} be the cyclotomic cosets such thatS is the union of these cosets. It is clear that the process of findingg(X) becomes simpler if we can find a representative from eachC_{i} , since we can then refer to a table, of irreducible factors, as given by, say, Peterson and Weldon. In this correspondence it was determined that the coset representatives for the cases ofm-r = 2 , withs = 2, 3 , andm-r=3 , withs=2 . 相似文献
15.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1970,16(6):745-751
In this paper, we establish the following result. Theorem:A_i , the number of codewords of weighti in the second-order binary Reed-Muller code of length2^m is given byA_i = 0 unlessi = 2^{m-1} or2^{m-1} pm 2^{m-l-j} , for somej, 0 leq j leq [m/2], A_0 = A_{2^m} = 1 , and begin{equation} begin{split} A_{2^{m-1} pm 2^{m-1-j}} = 2^{j(j+1)} &{frac{(2^m - 1) (2^{m-1} - 1 )}{4-1} } \ .&{frac{(2^{m-2} - 1)(2^{m-3} -1)}{4^2 - 1} } cdots \ .&{frac{(2^{m-2j+2} -1)(2^{m-2j+1} -1)}{4^j -1} } , \ & 1 leq j leq [m/2] \ end{split} end{equation} begin{equation} A_{2^{m-1}} = 2 { 2^{m(m+1)/2} - sum_{j=0}^{[m/2]} A_{2^{m-1} - 2^{m-1-j}} }. end{equation} 相似文献
16.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1971,17(1):65-70
In this paper we derive an expression for the minimum-mean-square error achievable in encodingt samples of a stationary correlated Gaussian source. It is assumed that the source output is not known exactly but is corrupted by correlated Gaussian noise. The expression is obtained in terms of the covariance matrices of the source and noise sequences. It is shown that ast rightarrow infty , the result agrees with a known asymptotic result, which is expressed in terms of the power spectra of the source and noise. The rate of convergence to the asymptotic results as a function of coding delay is investigated for the case where the source is first-order Markov and the noise is uncorrelated. WithD the asymptotic minimum-mean-square error andD_t the minimum-mean-square error achievable in transmittingt samples, we findmid D_t - D mid leq O((t^{-1} log t) ^ {1/2}) when we transmit the noisy source vectors over a noiseless channel andmid D_t - D mid leq O((t^{-1} log t)^ {1/3}) when the channel is noisy. 相似文献
17.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1987,33(6):919-923
LetC be the cyclic product code ofp single parity check codes of relatively prime lengthsn_{1}, n_{2},cdots , n_{p} (n_{1} < n_{2} < cdots < n_{p}) . It is proven thatC can correct2^{P-2}+2^{p-3}-1 bursts of lengthn_{1} , andlfloor(max{p+1, min{2^{p-s}+s-1,2^{p-s}+2^{p-s-1}}}-1)/2rfloor bursts of lengthn_{1}n_{2} cdots n_{s} (2leq s leq p-2) . Forp=3 this means thatC is double-burst-n_{1} -correcting. An efficient decoding algorithm is presented for this code. 相似文献
18.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1974,20(5):598-601
In comparing a signalf(t) with its amplitude-distorted formg(f(t)) , whereg(cdot) is a monotonically increasing function of its argument, one is led to consider the correlation function begin{equation} R(s) triangleq int_{-infty}^{infty} dtg (f(t))f(t-s). end{equation} A rigorous proof is given of the inequalityR(s) leq R(O) . Generalizations are presented for the cases of finite domains and of signals defined in two-dimensional space. 相似文献
19.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(3):480-484
Two algorithms are presented for the generation of full-length shift-register cycles, also referred to as de Bruijn sequences. The first algorithm generates2^{k cdot g(n,k) full cycles of length2^{n} , using3n + k cdot g(n, k) bits of storage, wherek is a free parameter in the range1 leq k leq 2^{((n-4)/2)} , andg(n, k) is of the order ofn - 2 log k . The second algorithm generates about2^{n^{2}/4} full cycles of length2^{n} , using aboutn^{2}/2 bits of storage. In both algorithms, the time required to produce the next bit from the lastn bits is close ton . A possible application to the construction of stream ciphers is indicated. 相似文献
20.
Capacity theorems for the relay channel 总被引:28,自引:0,他引:28
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1979,25(5):572-584
A relay channel consists of an inputx_{l} , a relay outputy_{1} , a channel outputy , and a relay senderx_{2} (whose transmission is allowed to depend on the past symbolsy_{1} . The dependence of the received symbols upon the inputs is given byp(y,y_{1}|x_{1},x_{2}) . The channel is assumed to be memoryless. In this paper the following capacity theorems are proved. 1)Ify is a degraded form ofy_{1} , thenC : = : max !_{p(x_{1},x_{2})} min ,{I(X_{1},X_{2};Y), I(X_{1}; Y_{1}|X_{2})} . 2)Ify_{1} is a degraded form ofy , thenC : = : max !_{p(x_{1})} max_{x_{2}} I(X_{1};Y|x_{2}) . 3)Ifp(y,y_{1}|x_{1},x_{2}) is an arbitrary relay channel with feedback from(y,y_{1}) to bothx_{1} and x_{2} , thenC: = : max_{p(x_{1},x_{2})} min ,{I(X_{1},X_{2};Y),I ,(X_{1};Y,Y_{1}|X_{2})} . 4)For a general relay channel,C : leq : max_{p(x_{1},x_{2})} min ,{I ,(X_{1}, X_{2};Y),I(X_{1};Y,Y_{1}|X_{2}) . Superposition block Markov encoding is used to show achievability ofC , and converses are established. The capacities of the Gaussian relay channel and certain discrete relay channels are evaluated. Finally, an achievable lower bound to the capacity of the general relay channel is established. 相似文献