共查询到20条相似文献,搜索用时 15 毫秒
1.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1985,31(6):826-830
It is shown that the family ofq -ary generalized Reed-Solomon codes is identical to the family ofq -ary linear codes generated by matrices of the form[I|A] , whereI is the identity matrix, andA is a generalized Cauchy matrix. Using Cauchy matrices, a construction is shown of maximal triangular arrays over GF(q) , which are constant along diagonals in a Hankel matrix fashion, and with the property that every square subarray is a nonsingular matrix. By taking rectangular subarrays of the described triangles, it is possible to construct generator matrices[I|A] of maximum distance separable codes, whereA is a Hankel matrix. The parameters of the codes are(n,k,d) , for1 leq n leq q+ 1, 1 leq k leq n , andd=n-k+1 . 相似文献
2.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1975,21(5):589-592
In this correspondence a method is presented whereby the average synchronization-error-correcting capability of Tavares' subset codes may be improved with no additional cost in rate and with only a small increase in the complexity of encoding and decoding. The method consists simply in shifting every word of the subset codes in such a way so that the shifted versions have a maximum number of leading and trailing zeros. A lower bound on the increase in synchronization-error-correcting capability provided by this method is derived. 相似文献
3.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1972,18(2):307-307
An upper bound on the minimum distance of cyclic codes of composite length is presented. This upper bound proves the BCH bound to be exact for many cyclic codes. 相似文献
4.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1974,20(5):680-683
A construction of cyclic codes in which an "inner" cyclic code is concatenated with appropriately chosen "outer" cyclic codes is presented. An example of the construction that improves on BCH codes of low rate is provided. Conversely, any cyclic code of lengthn_1 n_2 can be constructed by this construction, wheren_1 andn_2 are relatively prime. 相似文献
5.
Low-density parity check codes over GF(q) 总被引:2,自引:0,他引:2
Gallager's (1962) low-density binary parity check codes have been shown to have near-Shannon limit performance when decoded using a probabilistic decoding algorithm. We report the empirical results of error-correction using the analogous codes over GF(q) for q>2, with binary symmetric channels and binary Gaussian channels. We find a significant improvement over the performance of the binary codes, including a rate 1/4 code with bit error probability <10-5 at Eb/N0=0.2 dB 相似文献
6.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1970,16(3):358-358
Letg(x)h(x) = x^n - 1, n = q^m - 1 , and assume thath(x) contains a primitive factorf(x) of degreem . IfV is theq -ary(n, k) cyclic code generated byg(x), U its subcode generated byg(x)f(x) , then it will be shown that the weight distribution ofV can be obtained from the weight distribution ofU and its cosetU + g(x) . 相似文献
7.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1979,25(4):480-483
Bose-Chadhuri-Hocquenghem (BCH) codes with symbols from an arbitrary finite integer ring are derived in terms of their generator polynomials. Tile derivation is based on the factorization ofx^{n}-1 over the unit ring of an appropriate extension of the Finite integer ring. The construction is thus shown to be similar to that for BCH codes over finite fields. 相似文献
8.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1987,33(6):919-923
LetC be the cyclic product code ofp single parity check codes of relatively prime lengthsn_{1}, n_{2},cdots , n_{p} (n_{1} < n_{2} < cdots < n_{p}) . It is proven thatC can correct2^{P-2}+2^{p-3}-1 bursts of lengthn_{1} , andlfloor(max{p+1, min{2^{p-s}+s-1,2^{p-s}+2^{p-s-1}}}-1)/2rfloor bursts of lengthn_{1}n_{2} cdots n_{s} (2leq s leq p-2) . Forp=3 this means thatC is double-burst-n_{1} -correcting. An efficient decoding algorithm is presented for this code. 相似文献
9.
10.
In this paper, only narrow-sense primitive BCH codes over GF(q) are considered. A formula, that can be used in many cases, is first presented for computing the dimension of BCH codes.
It improves the result given by MacWilliams and Sloane in 1977. A new method for finding the dimension of all types of BCH
codes is proposed. In second part, it is proved that the BCH bound is the leader of some cyclotomic coset, and we guess that
the minimum distance for any BCH code is also the leader of some cyclotomic coset.
Supported by the National Natural Science Foundation of China 相似文献
11.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1985,31(3):446-447
The covering radius is given for all binary cyclic codes of length less than or equal to31 . Many of these codes are optimal in the sense of having the smallest possible covering radius of any linear code of that length and dimension. 相似文献
12.
Thangaraj A. McLaughlin S.W. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2001,47(3):1176-1178
We provide a construction for quantum codes (Hermitian-self-orthogonal codes over GF(4)) starting from cyclic codes over GF(4m). We also provide examples of these codes some of which meet the known bounds for quantum codes 相似文献
13.
14.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1970,16(5):644-646
The minimum distance of a class of reversible cyclic codes has been proved to be greater than that given by the BCH bound. It is also noted that this class of codes includes the class of primitive double-error-correcting binary codes of Melas as well as the class of nonprimitive double-error-correcting binary codes discovered by Zetterberg as special cases. 相似文献
15.
16.
17.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1975,21(6):716-718
An algorithm is presented for the calculation of a cycle set for any cyclic code which has an irreducible parity-check polynomial. 相似文献
18.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1982,28(5):789-790
The rank of the generating matrix in certain cases is computed. The result is perhaps of interest in its own right, apart from any applications it may have. The method of proof, utilizing as it does a knowledge of the parameters of a certain association scheme, is a technique which can be profitably used elsewhere. 相似文献
19.
A closed form solution that yields the component shift required for the vector representation of m-sequences over GF(q2) in terms of m-sequences over GF(q2) is presented. Iterative application of this expression then enables the vctor representation of m-sequences over GF(q2m) in terms of m-sequences over GF(q). These vector m-seqeences can be used directly for the selection of frequencies in frequency hopped spread spectrum communication systems. 相似文献
20.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1979,25(2):246-250
Several theorems are presented which characterize Goppa codes having the property of becoming cyclic when an overall parity cheek is added. If such a Goppa code has location setL = GF (q^{m}) and a Goppa polynomialg(z) that is irreducible overGF(q^{m}) , theng(z) must be a quadratic. Goppa codes defined by(z- beta)^{a} and location setL with cardinalityn such thatn+l|q^{m}-1 are considered along with their subcodes. A sufficient condition onL is derived for the extended codes to become cyclic. This condition is also necessary whena = 1. The construction ofL for differentn satisfying the stated condition is investigated in some detail. Some irreversible Goppa codes have been shown to become cyclic when extended by an overall parity check. 相似文献