共查询到20条相似文献,搜索用时 31 毫秒
1.
General theory of doubly periodic arrays over an arbitrary finite field and its applications 总被引:2,自引:0,他引:2
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1978,24(6):719-730
A general theory of doubly periodic (DP) arrays over an arbitrary finite field GF(q) is presented. First the basic properties of DP arrays are examined. Next modules of linear recurring (LR) arrays are defined and their algebraic properties discussed in connection with ideals in an extension ringtilde{R} of the ringR of bivariate polynomials with coefficients in GF(q) . A finitetilde{R} -module of DP arrays is shown to coincide with thetilde{R} -module of LR arrays dermed by a zero-dimensional ideal intilde{R} . Equivalence relations between DP arrays are explored, i.e., rearrangements of arrays by means of unimodular transformations. Decimation and interleaving of arrays are defined in a two-dimensional sense. The general theory is followed by application to irreducible LR arrays. Among irreducible arrays,M -arrays are a two-dimensional analog ofM -sequences and may be constructed fromM -sequences by means of unimodular transformations. The results of this paper are also important in studying properties of Abelian codes. 相似文献
2.
Bent-function sequences 总被引:12,自引:0,他引:12
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1982,28(6):858-864
In this paper we construct a new family of nonlinear binary signal sets which achieve Welch's lower bound on simultaneous cross correlation and autocorrelation magnitudes. Given a parametern withn=0 pmod{4} , the period of the sequences is2^{n}-1 , the number of sequences in the set is2^{n/2} , and the cross/auto correlation function has three values with magnitudesleq 2^{n/2}+1 . The equivalent linear span of the codes is bound above bysum_{i=1}^{n/4}left(stackrel{n}{i} right) . These new signal sets have the same size and correlation properties as the small set of Kasami codes, but they have important advantages for use in spread spectrum multiple access communications systems. First, the sequences are "balances," which represents only a slight advantage. Second, the sequence generators are easy to randomly initialize into any assigned code and hence can be rapidly "hopped" from sequence to sequence for code division multiple access operation. Most importantly, the codes are nonlinear in that the order of the linear difference equation satisfied by the sequence can be orders of magnitude larger than the number of memory elements in the generator that produced it. This high equivalent linear span assures that the code sequence cannot be readily analyzed by a sophisticated enemy and then used to neutralize the advantages of the spread spectrum processing. 相似文献
3.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(2):385-388
LetV be an(n, k, d) binary projective geometry code withn = (q^{m}-1)/(q - 1), q = 2^{s} , andd geq [(q^{m-r}-1)/(q - 1)] + 1 . This code isr -step majority-logic decodable. With reference to the GF(q^{m}) = {0, 1, alpha , alpha^{2} , cdots , alpha^{n(q-1)-1} } , the generator polynomialg(X) , ofV , hasalpha^{nu} as a root if and only ifnu has the formnu = i(q - 1) andmax_{0 leq l < s} W_{q}(2^{l} nu) leq (m - r - 1)(q - 1) , whereW_{q}(x) indicates the weight of the radix-q representation of the numberx . LetS be the set of nonzero numbersnu , such thatalpha^{nu} is a root ofg(X) . LetC_{1}, C_{2}, cdots, C_{nu} be the cyclotomic cosets such thatS is the union of these cosets. It is clear that the process of findingg(X) becomes simpler if we can find a representative from eachC_{i} , since we can then refer to a table, of irreducible factors, as given by, say, Peterson and Weldon. In this correspondence it was determined that the coset representatives for the cases ofm-r = 2 , withs = 2, 3 , andm-r=3 , withs=2 . 相似文献
4.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1968,14(3):514-515
Recursive relations are given for updating the conditional densityp(theta_{k} | X_{k-1}, cdots X_{1}) (also forp(theta_{k} | X_{k}, cdots, X_{1}) ), wheretheta_{k} is a parameter of the density ofX_{k} . The observationsX_{1}, X_{2}, cdots are assumed to be conditionally independent (i.e., for known parameters), and the sequence of time-varying parameterstheta_{1}, theta_{2}, cdots constitutes a Markov-M sequence. The result requires the storage of an intermediate function of(theta_{k-1}, cdots , theta_{k-M}) . 相似文献
5.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1979,25(2):233-234
A senderA wants to sendN messagesx_{i} = 1 , ldots ,N , chosen from a set containingM different possible messages,M > N , to a receiverB . Everyx_{i} has to pass through the hands of a dishonest messengerC . ThereforeA andB agree on a mathematical transformationf and a secret parameter, or keyk , that will be used to produce the authenticatory_{i} = f(x_{i} , k ) , which is sent together withx . The key is chosen at random from a set ofL elements.C knowsf and can find all elements in the setG(x_{i},y_{i}) = {k|f(x_{i}, k) = y_{i}} given enough time and computer resources.C wants to changex_{i} into x^{prime} withoutB suspecting. This means thatC must find the new anthenticatory^{prime} = f(x^{prime} , k) . SinceG(x_{i},y_{i}) can be found for any(x_{i},y_{i}) , it is obvious thatC will always succeed unlessG(x_{i},y_{i}) contains more than one element. Here it is proved that the average probability of success forC is minimized if (a)G(x_{i}, y_{i}) containsL^{(N-1)/N} elements and (b) each new known pair(x_{j}, y_{j}) will diminish this set of solutions by a factor ofL^{-l/N} . The minimum average probability will then beL^{-l/N} . 相似文献
6.
7.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1985,31(4):543-545
A "slowly" fluctuating target is assumed to keep its radar cross section constant for the duration of several(M) dwells on target. To resolve multiple range and/or Doppler ambiguities, the received signal, which is presumably coherently processed (i.e., predetection integrated or matched filtered) over each dwell, must often be tested against a threshold, {em independently} of those on other dwells. Such a procedure is referred to as {em multiple detection}. A technique for the evaluation of a tight lower bound on the multiple-detection probabilityP_{M} , under Swerling case I statistics for the cross section, is presented in term of an infinite series and worked out in detail forP_{2} andP_{3} . Estimates on the computation error due to the truncation of the series are derived. Numerical results indicate thatP_{3} comes much closer toP_{1} than top_{1}^{3} or even toP_{1}P_{2} ; at an expected signal-to-noise ratio of13 dB and atP_{1} = 0.51 , it obtains thatP_{3} geq 0.40 , whereasP_{1}P_{2} = 0.23 andp_{1}^{3} = 0.17 . 相似文献
8.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1975,21(4):460-462
Skew-symmetric sequences of(2n + 1) terms,a_0,a_1,cdots,a_{2n} , are described for which the "merit factor" begin{equation} F_h = frac{biggl[sum_{i=0}^{2n} mid a_i mid biggr] ^2}{ 2 sum_{k=1}^{2n} biggl[ sum_{i=0}^{2n-k} text{sign} (a_i) cdot a_{i+k} biggl] ^2} end{equation} is unusually high. 相似文献
9.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1981,27(2):260-262
Certain useful properties of the cyclic codeV are discussed with wordsV(x)=V_{1}(x)(l+x^{n})/(l+x^{n_{1}})+V_{2}(x)(l+x^{n})/(l+x^{n_{2}}) , where fori=1,2,V_{i}(x) belongs to a binary codeV_{i} of lengthn_{i} . 相似文献
10.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(2):395-403
For any(n, k, d) binary linear code, the Griesmer bound says thatn geq sum_{i=0}^{k-1} lceil d/2^{i} rceil , wherelceil x rceil denotes the smallest integergeq x . We consider codes meeting the Griesmer bound with equality. These codes have parametersleft( s(2^{k} - 1) - sum_{i=1}^{p} (2^{u_{i}} - 1), k, s2^{k-1} - sum_{i=1}^{p} 2^{u_{i} -1} right) , wherek > u_{1} > cdots > u_{p} geq 1 . We characterize all such codes whenp = 2 oru_{i-1}-u_{i} geq 2 for2 leq i leq p . 相似文献
11.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1979,25(1):105-109
LetV be a binary linear(n,k) -code defined by a check matrixH with columnsh_{1}, cdots ,h_{n} , and leth(x) = 1 ifx in {h_{1}, cdots , h_{n} , andh(x) = 0 ifx in neq {h_{1}, cdots ,h_{n}} . A combinatorial argument relates the Walsh transform ofh(x) with the weight distributionA(i) of the codeV for smalli(i< 7) . This leads to another proof of the Plessi th power moment identities fori < 7 . This relation also provides a simple method for computing the weight distributionA(i) for smalli . The implementation of this method requires at most(n-k+ 1)2^{n-k} additions and subtractions,5 .2^{n-k} multiplications, and2^{n-k} memory cells. The method may be very effective if there is an analytic expression for the characteristic Boolean functionh(x) . This situation will be illustrated by several examples. 相似文献
12.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1972,18(2):310-312
Given a binary data streamA = {a_i}_{i=o}^infty and a filterF whose output at timen isf_n = sum_{i=0}^{n} a_i beta^{n-i} for some complexbeta neq 0 , there are at most2^{n +1) distinct values off_n . These values are the sums of the subsets of{1,beta,beta^2,cdots,beta^n} . It is shown that all2^{n+1} sums are distinct unlessbeta is a unit in the ring of algebraic integers that satisfies a polynomial equation with coefficients restricted to +1, -1, and 0. Thus the size of the state space{f_n} is2^{n+1} ifbeta is transcendental, ifbeta neq pm 1 is rational, and ifbeta is irrational algebraic but not a unit of the type mentioned. For the exceptional values ofbeta , it appears that the size of the state space{f_n} grows only as a polynomial inn ifmidbetamid = 1 , but as an exponentialalpha^n with1 < alpha < 2 ifmidbetamid neq 1 . 相似文献
13.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1986,32(6):733-742
Let{X_{i}}_{i=1}^{infty} be a sequence of independent Bernoulli random variables with probabilityp thatX_{i} = 1 and probabilityq=1-p thatX_{i} = 0 for alli geq 1 . Time-invariant finite-memory (i.e., finite-state) estimation procedures for the parameter p are considered which takeX_{1}, cdots as an input sequence. In particular, an n-state deterministic estimation procedure is described which can estimate p with mean-square errorO(log n/n) and ann -state probabilistic estimation procedure which can estimatep with mean-square errorO(1/n) . It is proved that theO(1/n) bound is optimal to within a constant factor. In addition, it is shown that linear estimation procedures are just as powerful (up to the measure of mean-square error) as arbitrary estimation procedures. The proofs are based on an analog of the well-known matrix tree theorem that is called the Markov chain tree theorem. 相似文献
14.
On source coding with side information at the decoder 总被引:2,自引:0,他引:2
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1975,21(3):294-300
Let{(X_k, Y_k, V_k)}_{k=1}^{infty} be a sequence of independent copies of the triple(X,Y,V) of discrete random variables. We consider the following source coding problem with a side information network. This network has three encoders numbered 0, 1, and 2, the inputs of which are the sequences{ V_k}, {X_k} , and{Y_k} , respectively. The output of encoder i is a binary sequence of rateR_i, i = 0,1,2 . There are two decoders, numbered 1 and 2, whose task is to deliver essentially perfect reproductions of the sequences{X_k} and{Y_k} , respectively, to two distinct destinations. Decoder 1 observes the output of encoders 0 and 1, and decoder 2 observes the output of encoders 0 and 2. The sequence{V_k} and its binary encoding (by encoder 0) play the role of side information, which is available to the decoders only. We study the characterization of the family of rate triples(R_0,R_1,R_2) for which this system can deliver essentially perfect reproductions (in the usual Shannon sense) of{X_k} and{Y_k} . The principal result is a characterization of this family via an information-theoretic minimization. Two special cases are of interest. In the first,V = (X, Y) so that the encoding of{V_k } contains common information. In the second,Y equiv 0 so that our problem becomes a generalization of the source coding problem with side information studied by Slepian and Wo1f [3]. 相似文献
15.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1983,29(3):390-395
The encoding of a discrete memoryless multiple source{( X_{i}, Y_{i})}_{i=1}^{infty} for reconstruction of a sequence{Z_{i}}_{i=1}^{infty}} , withZ_{i} = F( X_{i}, Y_{i}); i = 1,2, cdots is considered. We require that the encoding should be such that{X_{i}}_{i=1}^{infty} is encoded first without any consideration of{Y_{i}}_{i=1}^{infty} , while in a second part of the encoding, this latter sequence is encoded based on knowledge of the outcome of the first encoding. The resulting scheme is called successive encoding. We find general outer and inner bounds for the corresponding set of achievable rates along with a complete single letter characterization for the special caseH( X_{i}|Z_{i}, Y_{i}) = 0 . Comparisons with the Slepian-Wolf problem and the Ahlswede-Korner-Wyner side information problem are carried out. 相似文献
16.
Higher dimensional orthogonal designs and applications 总被引:2,自引:0,他引:2
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1981,27(6):772-779
The concept of orthogonal design is extended to higher dimensions. A properg -dimensional design[d_{ijk cdots upsilon}] is defined as one in which all parallel(g-1) -dimensional layers, in any orientation parallel to a hyper plane, are uncorrelated. This is equivalent to the requirement thatd_{ijk cdots upsilon} in {0, pm x_{1}, cdots , pm x_{t} } , wherex_{1}, cdots , x_{t} are commuting variables, and thatsum_{p} sum_{q} sum_{r} cdots sum_{y} d_{pqr cdots ya} d_{pqr cdots yb} = left( sum_{t} s_{i}x_{i}^{2} right)^{g-1} delta ab, where(s{1}, cdots , s{t}) are integers giving the occurrences ofpm x_{1}, cdots , pm x_{t} in each row and column (this is called the type(s_{1}, cdot ,s_{t})^{g-1}) and(pqr cdots yz) represents all permutations of(ijk cdots upsilon) . This extends an idea of Paul J. Shlichta, whose higher dimensional Hadamard matrices are special cases withx_{1}, cdots , x_{t} in {1,- 1}, (s_{1}, cdots, s_{t})=(g) , and(sum_{t}s_{i}x_{i}^{2})=g . Another special case is higher dimensional weighing matrices of type(k)^{g} , which havex_{1}, cdots , x_{t} in {0,1,- 1}, (s_{1}, cdots, s_{t})=(k) , and(sum_{t}s_{i}x_{i}^{2})=k . Shlichta found properg -dimensional Hadamard matrices of size(2^{t})^{g} . Proper orthogonal designs of type 相似文献
17.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1974,20(2):278-279
Asymptotic properties of expected distortion are studied for the delay-time-weighted probability of error distortion measured_n(x,tilde{x}) = n^{-1} sum_{t=0}^{n-1} f(t + n)[l - delta(x_t,tilde{x}_t)] ,, wherex = (x_0,x_1,cdots,x_{n-1}) andtilde{x} = (tilde{x}_0,tilde{x}_1,cdots,tilde{x}_{n-1}) are source and reproducing vectors, respectively, anddelta (cdot, cdot) is the Kronecker delta. With reasonable block coding and transmission constraintsx_t is reproduced astilde{x}_t with a delay oft + n time units. It is shown that if the channel capacity is greater than the source entropyC > H(X) , then there exists a sequence of block lengthn codes such thatE[d_n(X,tilde{X})] rigjhtarrow 0 asn rightarrow infty even iff(t) rightarrow infty at an exponential rate. However, iff(t) grows at too fast an exponential rate, thenE[d_n(X,tilde{X})] rightarrow infty asn rightarrow infty . Also, ifC < H(X) andf(t) rightarrow infty thenE[d_n(X,tilde{X})] rightarrow infty asn rightarrow infty no matter how slowlyf(t) grows. 相似文献
18.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1979,25(2):246-250
Several theorems are presented which characterize Goppa codes having the property of becoming cyclic when an overall parity cheek is added. If such a Goppa code has location setL = GF (q^{m}) and a Goppa polynomialg(z) that is irreducible overGF(q^{m}) , theng(z) must be a quadratic. Goppa codes defined by(z- beta)^{a} and location setL with cardinalityn such thatn+l|q^{m}-1 are considered along with their subcodes. A sufficient condition onL is derived for the extended codes to become cyclic. This condition is also necessary whena = 1. The construction ofL for differentn satisfying the stated condition is investigated in some detail. Some irreversible Goppa codes have been shown to become cyclic when extended by an overall parity check. 相似文献
19.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1983,29(6):918-923
A new source coding problem is considered for a one-way communication system with correlated source outputs{XY} . One of the source outputs, i.e.,{X} , must be transmitted to the receiver within a prescribed distortion tolerance as in ordinary source coding. On the other hand, the other source output, i.e.,{Y} , has to be kept as secret as possible from the receiver or wiretappers. For this case the equivocation-distortion functionGamma ast(d) and the rate-distortion-equivocation functionRast (d,e) are defined and evaluated. The former is the maximum achievable equivocation of{Y} under the distortion toleranced for{X} , and the latter is the minimum rate necessary to attain both the equivocation tolerancee for{Y} and the distortion toleranced for{X} . Some examples are included. 相似文献
20.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1965,11(1):83-90
G. E. Albert's general sequential test for making one of r distinct decisions about a distribution functionF(x_{i}|x_{i-1}) by observing a sequence ofx_{i} 's is presented, and his results, which give the performance of this test as the solutions of integral equations, are stated. This test is more general than the usual sequential probability ratio test of Wald, and includes nonoptimum, as well as Wald's optimum, sequential tests. Albert's equations are used to treat the incoherent detection of a sine wave in Gaussian noise by a biased square-law detector. This is the detector which uses samplesy_{i} of the envelope of the received waveform to calculate the sumsx_{i} = k sum_{j=1}^{i} (yj^{2} - bias), i = 1, 2, cdots , and sequentially compares thex_{i} to two thresholds until anx_{i} is found which is less than the lower thresholdB , or greater than the upper thresholdA . Then ifx_{i} leq B , it is decided that the signal is not present (dismissal), and ifA leq x_{i} it is decided that the signal is present (alarm). Though this is not the optimum detector for a sine wave in Gaussian noise (unless the SNR is very small), it is a convenient test to implement and is of considerable interest in its own right. Fory_{i} having the Rayleigh probability distributionf(y) = y exp{-y^{2}/2} , i.e., for the received waveform consisting of Gaussian noise alone, {em exact} solutions are obtained for the probability of (false) alarm and for the average test duration. These results are unique in that they are valid without restrictions on either the design input SNR or on the thresholds A and B. Curves of the probability of false alarm vs. the upper threshold A, and of the average test duration vs. the expected input SNR are presented, and are compared to similar results of Wald. 相似文献