共查询到20条相似文献,搜索用时 31 毫秒
1.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1986,32(5):706-709
Recently Kasami {em et al.} presented a linear programming approach to the weight distribution of binary linear codes [2]. Their approach to compute upper and lower bounds on the weight distribution of binary primitive BCH codes of length2^{m} - 1 withm geq 8 and designed distance2t + 1 with4 leq t leq 5 is improved. From these results, the relative deviation of the number of codewords of weightjleq 2^{m-1} from the binomial distribution2^{-mt} left( stackrel{2^{m}-1}{j} right) is shown to be less than 1 percent for the following cases: (1)t = 4, j geq 2t + 1 andm geq 16 ; (2)t = 4, j geq 2t + 3 and10 leq m leq 15 ; (3)t=4, j geq 2t+5 and8 leq m leq 9 ; (4)t=5,j geq 2t+ 1 andm geq 20 ; (5)t=5, j geq 2t+ 3 and12 leq m leq 19 ; (6)t=5, j geq 2t+ 5 and10 leq m leq 11 ; (7)t=5, j geq 2t + 7 andm=9 ; (8)t= 5, j geq 2t+ 9 andm = 8 . 相似文献
2.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1972,18(6):824-825
For1 leq i leq m - s- 2 and0 leq s leq m -2i , the intersection of the binary BCH code of designed distance2 ^{m-s-1} - 2 ^{m-s-t-1} - 1 and length2^m - 1 with the shortened(s + 2) th-order Reed-Muller code of length2^m -- 1 has codewords of weight2^{m-s-1} - 2^{m-s-t-1} - 1 . 相似文献
3.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1974,20(3):311-316
Upper bounds to the capacity of band-limited Gaussianm th-order autoregressive channels with feedback and average energy constraintE are derived. These are the only known hounds on one- and two-way autoregressive channels of order greater than one. They are the tightest known for the first-order case. In this case letalpha_1 be the regression coefficient,sigma^2 the innovation variance,N the number of channel iterations per source symbol, ande = E/N ; then the first-order capacityC^1 is bounded by begin{equation} C^1 leq begin{cases} frac{1}{2} ln [frac{e}{sigma^2}(1+ mid alpha_1 mid ) ^ 2 +1], & frac{e}{sigma^2} leq frac{1}{1- alpha_1^2} \ frac{1}{2} ln [frac{e}{sigma^2} + frac{2mid alpha_1 mid}{sqrt{1-alpha_1^2}} sqrt{frac{e}{simga^2}} + frac{1}{1-alpha_1^2}], & text{elsewhere}.\ end{cases} end{equation} This is equal to capacity without feedback for very low and very highe/sigma^2 and is less than twice this one-way capacity everywhere. 相似文献
4.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1982,28(4):665-668
The modular distance induces a metric if and only if the nonadjacent form of the modulusM has one of the following forms:1) 2^{n}+2^{n-2} pm 2^{i} , wheren-igeq 4; 2) 2^{n} - 2^{j} pm 2^{i} , where2 leq n -j leq 5 andj-igeq 2; 3) 2^{n} pm 2^{j} , wheren -j geq 2; 4) 2^{n} . 相似文献
5.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1973,19(6):769-772
In this, the first part of a two-part paper, we establish a theorem concerning the entropy of a certain sequence of binary random variables. In the sequel we will apply this result to the solution of three problems in multi-user communication, two of which have been open for some time. Specifically we show the following. LetX andY be binary randomn -vectors, which are the input and output, respectively, of a binary symmetric channel with "crossover" probabilityp_0 . LetH{X} andH{ Y} be the entropies ofX andY , respectively. Then begin{equation} begin{split} frac{1}{n} H{X} geq h(alpha_0), qquad 0 leq alpha_0 &leq 1, Rightarrow \ qquad qquad &qquad frac{1}{n}H{Y} geq h(alpha_0(1 - p_0) + (1 - alpha_0)p_0) end{split} end{equation} whereh(lambda) = -lambda log lambda - (1 - lambda) log(l - lambda), 0 leq lambda leq 1 . 相似文献
6.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1964,10(1):72-74
Upper and lower bounds are established for the mean-square variation of a stationary processX(t) whose power spectrum is bounded byomega_{c} , in terms of its average powerP_{0} and the average powerP_{1} of its derivative. It is shown thatleft( frac{2}{pi} right)^{2} P_{1} tau^{2} leq E {|X(t+tau )-X(t)|^{2}} leq P_{1} tau^{2} leq omega_{c}^{2}P_{0}tau^{2} where the upper bounds are valid for anytau and the lower bound fortau < pi / omega_{c} . These estimates are applied to the mean-square variation of the envelope of a quasi-monochromatic process. 相似文献
7.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1976,22(3):363-366
This article presents new tighter upper bounds on the rate of Gaussian autoregressive channels with linear feedback. The separation between the upper and lower bounds is small. We havefrac{1}{2} ln left( 1 + rho left( 1+ sum_{k=1}^{m} alpha_{k} x^{- k} right)^{2} right) leq C_{L} leq frac{1}{2} ln left( 1+ rho left( 1+ sum_{k = 1}^{m} alpha_{k} / sqrt{1 + rho} right)^{2} right), mbox{all rho} , whererho = P/N_{0}W, alpha_{l}, cdots, alpha_{m} are regression coefficients,P is power,W is bandwidth,N_{0} is the one-sided innovation spectrum, andx is a root of the polynomial(X^{2} - 1)x^{2m} - rho left( x^{m} + sum^{m}_{k=1} alpha_{k} x^{m - k} right)^{2} = 0. It is conjectured that the lower bound is the feedback capacity. 相似文献
8.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1978,24(5):627-628
Upper bounds on the covering radius of binary codes are studied. In particular it is shown that the covering radiusr_{m} of the first-order Reed-Muller code of lenglh2^{m} satisfies2^{m-l}-2^{lceil m/2 rceil -1} r_{m} leq 2^{m-1}-2^{m/2-1} . 相似文献
9.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(2):395-403
For any(n, k, d) binary linear code, the Griesmer bound says thatn geq sum_{i=0}^{k-1} lceil d/2^{i} rceil , wherelceil x rceil denotes the smallest integergeq x . We consider codes meeting the Griesmer bound with equality. These codes have parametersleft( s(2^{k} - 1) - sum_{i=1}^{p} (2^{u_{i}} - 1), k, s2^{k-1} - sum_{i=1}^{p} 2^{u_{i} -1} right) , wherek > u_{1} > cdots > u_{p} geq 1 . We characterize all such codes whenp = 2 oru_{i-1}-u_{i} geq 2 for2 leq i leq p . 相似文献
10.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1971,17(4):368-371
The following model for the white Gaussian channel with or without feedback is considered: begin{equation} Y(t) = int_o ^{t} phi (s, Y_o ^{s} ,m) ds + W(t) end{equation} wherem denotes the message,Y(t) denotes the channel output at timet ,Y_o ^ {t} denotes the sample pathY(theta), 0 leq theta leq t. W(t) is the Brownian motion representing noise, andphi(s, y_o ^ {s} ,m) is the channel input (modulator output). It is shown that, under some general assumptions, the amount of mutual informationI(Y_o ^{T} ,m) between the messagem and the output pathY_o ^ {T} is directly related to the mean-square causal filtering error of estimatingphi (t, Y_o ^{t} ,m) from the received dataY_o ^{T} , 0 leq t leq T . It follows, as a corollary to the result forI(Y_o ^ {T} ,m) , that feedback can not increase the capacity of the nonband-limited additive white Gaussian noise channel. 相似文献
11.
Achievable rates for multiple descriptions 总被引:12,自引:0,他引:12
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1982,28(6):851-857
12.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1975,21(4):460-462
Skew-symmetric sequences of(2n + 1) terms,a_0,a_1,cdots,a_{2n} , are described for which the "merit factor" begin{equation} F_h = frac{biggl[sum_{i=0}^{2n} mid a_i mid biggr] ^2}{ 2 sum_{k=1}^{2n} biggl[ sum_{i=0}^{2n-k} text{sign} (a_i) cdot a_{i+k} biggl] ^2} end{equation} is unusually high. 相似文献
13.
Multimode channel waveguides were formed by field-assisted diffusion of Ag+ ion from vacuum-evaporated Ag films, into a sodium aluminosilicate glass reported to yield high diffusion rates for alkali ions. Two-dimensional index profiles of channel waveguides formed by diffusion from a strip aperture were controlled by means of diffusion time, temperature, and electric field. The diffusion equation for diffusion through a strip aperture in the presence of a one-dimensional electric field was solved. Its solution was in agreement with measured concentration profiles:frac{C(x,y,t)}{C_{0}} = frac{1}{2} { erf (frac{a - x}{2sqrt{Dt}}) + erf (frac{a + x}{2sqrt{Dt}})} .frac{1}{2} { erfc (frac{y - muE_{y}t}{2sqrt{Dt}}) + e^{(yE_{y}/D)} erfc (frac{y + muE_{y}t}{2sqrt{Dt}})} Diffusion coefficients in this aluminosilicate glass were determined to beD =(2.41 times 10^{-13}) (frac{m^{2}}{s})) .exp (frac{-3.1 times 10^{4}frac{J}{mol}}{RT}) Diffusion coefficients were higher (between 150°C and 300°C) than those of a low-iron soda-lime silicate glass "standard" also studied, for which diffusion coefficients wereD =(3.28 times 10^{-13} (frac{m^{2}}{s})) .exp (frac{-3.6 times 10^{4}}{RT} (frac{J}{mol})) This difference in diffusion coefficients is due to the higher activation energy of diffusion in the soda-lime silicate glass. The Gladstone-Dale relation was used to calculate the maximum possible refractive index change via Ag+-Na+ ion-exchange for each type of glass. The maximum index change in the sodium aluminosilicate glass is found to be about 65 percent of that in the soda-lime silicate glass. 相似文献
14.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1987,33(5):744-747
Letalpha_{n} denote the number of cosets with minimum weightn of the(2^{m}, m + 1) Reed-Muller code. Thealpha_{n} for2^{m-2} leq n < 2^{m-2} + 2^{m - 4} is determined. 相似文献
15.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1975,21(1):95-96
Some integrals are presented that can be expressed in terms of theQ_M function, which is defined as begin{equation} Q_M(a,b) = int_b^{infty} dx x(x/a)^{M-1} exp (- frac{x^2 + a^2}{2}) I_{M-1}(ax), end{equation} whereI_{M-1} is the modified Bessel function of orderM-1 . Some integrals of theQ_M function are also evaluated. 相似文献
16.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(2):385-388
LetV be an(n, k, d) binary projective geometry code withn = (q^{m}-1)/(q - 1), q = 2^{s} , andd geq [(q^{m-r}-1)/(q - 1)] + 1 . This code isr -step majority-logic decodable. With reference to the GF(q^{m}) = {0, 1, alpha , alpha^{2} , cdots , alpha^{n(q-1)-1} } , the generator polynomialg(X) , ofV , hasalpha^{nu} as a root if and only ifnu has the formnu = i(q - 1) andmax_{0 leq l < s} W_{q}(2^{l} nu) leq (m - r - 1)(q - 1) , whereW_{q}(x) indicates the weight of the radix-q representation of the numberx . LetS be the set of nonzero numbersnu , such thatalpha^{nu} is a root ofg(X) . LetC_{1}, C_{2}, cdots, C_{nu} be the cyclotomic cosets such thatS is the union of these cosets. It is clear that the process of findingg(X) becomes simpler if we can find a representative from eachC_{i} , since we can then refer to a table, of irreducible factors, as given by, say, Peterson and Weldon. In this correspondence it was determined that the coset representatives for the cases ofm-r = 2 , withs = 2, 3 , andm-r=3 , withs=2 . 相似文献
17.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1983,29(3):345-348
Ifm is odd andsigma /in Aut GF(2^{m}) is such thatx rightarrow x^{sigma^{2}-1} is1-1 , there is a[2^{m+1}-1,2^{m+l}-2m-2] nonlinear binary codeP(sigma) having minimum distance 5. All the codesP(sigma) have the same distance and weight enumerators as the usual Preparata codes (which rise asP(sigma) whenx^{sigma}=x^{2}) . It is shown thatP(sigma) andP(tau) are equivalent if and only iftau=sigma^{pm 1} , andAut P(sigma) is determined. 相似文献
18.
《Electron Devices, IEEE Transactions on》1957,4(1):22-24
An approximate formula is developed for the current of a parallel-plane diode including the effects of initial velocities of emission. For an oxide-coated cathode (T = 1000 °K) the approximate result is:J = 2.33 times 10^{-6} frac{V^{3/2}}{x^{2}} cdot[1 + frac{11.4(J_{s}x^{2})^{1/4}}{V^{3/4}} + frac{3.22(J_{s}x^{2})^{1/8}}{V^{3/2}}] where,J , Js , andx are in suitable units such that Jx2andJ_{s}x^{2} are in amperes and V in volts. A comparison is made between this result, Child's 3/2 power solution, and the Epstein-Fry-Langmuir solution. The result given above being an explicit solution of the current is particularly advantageous over prior approximate solutions. 相似文献
19.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1986,32(3):436-440
Using earlier methods a combinatorial upper bound is derived for|C|. cdot |D| , where(C,D) is adelta -decodable code pair for the noisy two-access binary adder channel. Asymptotically, this bound reduces toR_{1}=R_{2} leq frac{3}{2} + elog_{2} e - (frac{1}{2} + e) log_{2} (1 + 2e) = frac{1}{2} - e + H(frac{1}{2} - e) - frac{1}{2}H(2e), wheree = lfloor (delta - 1)/2 rfloor /n, n rightarrow infty andR_{1} resp.R_{2} is the rate of the codeC resp.D . 相似文献
20.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1969,15(4):440-444
Forf(t) a real-valued signal band-limited to- pi r leq omega leq pi r (0 < r < 1) and represented by its Fourier integral, upper bounds are established for the magnitude of the truncation error whenf(t) is approximated at a generic timet by an appropriate selection ofN_{1} + N_{2} + 1 terms from its Shannon sampling series expansion, the latter expansion being associated with the full band[-pi, pi] and thus involving samples off taken at the integer points. Results are presented for two cases: 1) the Fourier transformF(omega) is such that|F(omega)|^{2} is integrable on[-pi, pi r] (finite energy case), and 2)|F(omega)| is integrable on[-pi r, pi r] . In case 1) it is shown that the truncation error magnitude is bounded above byg(r, t) cdot sqrt{E} cdot left( frac{1}{N_{1}} + frac{1}{N_{2}} right) whereE denotes the signal energy andg is independent ofN_{1}, N_{2} and the particular band-limited signal being approximated. Correspondingly, in case 2) the error is bounded above byh(r, t) cdot M cdot left( frac{1}{N_{1}} + frac{1}{N_{2}} right) whereM is the maximum signal amplitude andh is independent ofN_{1}, N_{2} and the signal. These estimates possess the same asymptotic behavior as those exhibited earlier by Yao and Thomas [2], but are derived here using only real variable methods in conjunction with the signal representation. In case 1), the estimate obtained represents a sharpening of the Yao-Thomas bound for values ofr dose to unity. 相似文献