共查询到20条相似文献,搜索用时 0 毫秒
1.
This paper deals with the decoding of lowpass discrete Fourier transform (DFT) codes in the presence of both errors and erasures. We propose a subspace-based approach for the error localization that is similar to the subspace approaches followed in the array signal processing for direction-of-arrival (DOA) estimation. The basic idea is to divide a vector space into two orthogonal subspaces of which one is spanned by the error locator vectors. The locations of the errors are estimated from the spanning eigenvectors of the complement subspace. However, unlike the subspace approach in DOA estimation, which is similar to estimating the subspaces from the syndrome covariance matrix after a projection, in the proposed approach, the subspaces are estimated from the modified syndrome covariance matrix after a whitening transform. Simulation results with a Gauss-Markov source reveal that the proposed algorithm is more efficient than the coding theoretic approach on impulsive channels as well as the subspace approach with projection on lossy channels. 相似文献
2.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1983,29(5):748-750
We give a minimal set consisting of14 permutations to decode the(24,12,8) Golay code using a permutation decoding method. 相似文献
3.
Satellite broadcast communications make demand on reliable and secure data transmissions. Aiming at balancing data disorder and correlation from encryption and errors correction, this paper proposes a novel error correction and encryption algorithm combined fountain code and advanced encrypt standard (FC‐AES), which constructs a 3‐layer cascade framework for cryptosystem to harmonize the coding payloads of services, products, and users. Furtherly, distributed degree would be compensated with round key, which provides with entire security controls. Information degree is designed to limit data overhead and disorder. Sparsely coding control for product degree is developed to prevent decoding error avalanche. We also provide a suitable decryption scheme for FC‐AES. The simulations show the new algorithm enhances the performance of data‐recovery failure probability by 29.56% and average error symbol rate by 13.09%. 相似文献
4.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1975,21(2):230-233
A method is proposed that utilizes punctured Reed-Solomon (RS) block codes for adaptive coding. Part of the redundancy of the RS codewords is used in a convolutional coding framework. This enables some codewords to use more redundancy for correcting errors, while other adjacent codewords use less redundancy. 相似文献
5.
6.
7.
8.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1987,33(6):931-933
The extended Nordstrom-Robinson code is an optimum nonlinear double-error-correcting code of length16 with considerable practical importance. This code is also useful as a rate1/2 vector quantizer for random waveforms such as speech linear-predictive-coding (LPC) residual. A fast decoding algorithm is described for maximum likelihood decoding (or nearest neighbor search in the squared-error sense) with304 additions and128 comparisons. 相似文献
9.
《Solid-State Circuits, IEEE Journal of》1986,21(6):1016-1025
A correction algorithm has been implemented that gives an almost twofold improvement in conversion speed without loss of accuracy or changes to the analog circuitry of a slower design. The design of a smart successive-approximation register chip, which has been fabricated in a double poly CMOS process and takes up 18 mil/SUP 2/ in die area, is described. The area is 13% larger than that of an A/D converter utilizing the same analog chip but a conventional digital chip without error correction. A speed improvement from 12 to 7 /spl mu/s was obtained with digital error correction. 相似文献
10.
A new high rate code scheme is proposed in this paper. It consists of serial concatenated recursive systematic ordinary (nonpunctured) convolutional codes with only 8 states in the trellis of the corresponding reciprocal dual codes. With a low complexity and highly parallel decoding algorithm, over additive white Gaussian noise channels, the proposed codes can achieve good bit error rate (BER) performance comparable to that of turbo codes and low density parity check (LDPC) codes. At code rate R=16/17, the overall decoding complexity of the proposed code scheme is almost half that of the LDPC codes. 相似文献
11.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(2):388-392
We study the probability of having an undetected error when a linear block code is used to correct up tot errors on a symmetric channel, and the remaining power of the code is used for error detection. 相似文献
12.
Shyue-Win Wei Che-Ho Wei 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1990,36(3):692-695
An algebraic decoding method for triple-error-correcting binary BCH codes applicable to complete decoding of the (23,12,7) Golay code has been proved by M. Elia (see ibid., vol.IT-33, p.150-1, 1987). A modified step-by-step complete decoding algorithm of this Golay code is introduced which needs fewer shift operations than Kasami's error-trapping decoder. Based on the algorithm, a high-speed hardware decoder of this code is proposed 相似文献
13.
Algebraic decoding of the (32, 16, 8) quadratic residue code 总被引:1,自引:0,他引:1
Reed I.S. Yin X. Truong T.-K. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1990,36(4):876-880
An algebraic decoding algorithm for the 1/2-rate (32, 16, 8) quadratic residue (QR) code is found. The key idea of this algorithm is to find the error locator polynomial by a systematic use of the Newton identities associated with the code syndromes. The techniques developed extend the algebraic decoding algorithm found recently for the (32, 16, 8) QR code. It is expected that the algebraic approach developed here and by M. Elia (1987) applies also to longer QR codes and other BCH-type codes that are not fully decoded by the standard BCH decoding algorithm 相似文献
14.
Product codes are powerful codes that can be used to correct errors or recover erasures. The simplest form of a product code is that where every row and every column is terminated by a single parity bit, referred to as single parity check (SPC) product code. This code has a minimum distance of four and is thus guaranteed to recover all single, double, and triple erasure patterns. Judging the code performance based on its minimum distance is very pessimistic because the code is actually capable of recovering many higher erasure patterns. This paper develops a novel approach for deriving an upper bound on the post-decoding erasure rate for the SPC product code with iterative decoding. Simulation shows that the derived bound is very tight 相似文献
15.
16.
This paper compares the complexity of an extended Kasami (1964) algorithm with three other algorithms for the Golay code. A nonmathematical method is described to determine the best cover positions. This leads to a result different from the Kasami algorithm and significantly reduces the decoding complexity 相似文献
17.
A special construction of a generalized low-density parity-check (LDPC) code and a low-complexity algorithm for his code decoding are proposed. A lower estimate of the exponent of the decoding error probability is obtained for the considered code and the decoding algorithm. This estimate leads the conclusion that, in an ensemble of considered LDPC codes, there are codes with rates as high as the code capacity and the exponent of the decoding error probability exceeds zero. 相似文献
18.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1987,33(1):150-151
It is shown that the algebraic method for decoding three-error-correcting BCH codes is also applicable to complete decoding of the(23,12,7) Golay code. 相似文献
19.
In this contribution we present an exhaustive treatment of various coding and decoding techniques for use in fast frequency-hopping/multiple frequency shift keying multiple-access systems. One of the main goals is to show how reliability information on each received bit can be derived to enable soft-decision decoding. Convolutional codes as well as turbo codes are considered applying soft-decision, erasure, and hard-decision decoding. Their performance is compared to that of previously proposed Reed-Solomon with either errors-only or errors-and-erasures decoding. A mobile radio environment yielding a frequency-selective fading channel is assumed. It is shown that the application of turbo codes and convolutional codes with soft decision decoding can allow for a comparable number of simultaneously transmitting users to Reed-Solomon codes with errors-and-erasures decoding. Furthermore, the advantage of soft decisions is shown, which can be applied to a widely and growing range of channel codes. The pertinent technique of calculating soft decisions is described in the paper 相似文献
20.
Humphreys J.F. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1992,38(3):1122-1125
An algebraic decoding algorithm for the ternary (13,7,5) quadratic residue code is presented. This seems to be the first attempt to provide an algebraic decoding algorithm for a quadratic residue code over a nonbinary field 相似文献