首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Shadow codes and weight enumerators   总被引:1,自引:0,他引:1  
The technique of using shadow codes to build larger self-dual codes is extended to codes over arbitrary fields. It is shown how to build the codes and how to determine the new weight enumerator as well. For codes over fields equipped with a square root of -1 and not of characteristic 2, a self-dual code of length n+2 can be built from a self-dual code of length n; for codes over a field without a square root of -1 and not of characteristic 2 a self-dual code of length n+4 is built from a self-dual code of length n; and for codes over fields of characteristic 2 the length of the new self-dual code depends on the presence of the all-one vector in the subcode chosen. In certain cases using the subcode of vectors orthogonal to the all-one vector, the new weight enumerator can be calculated directly from the original weight enumerator. Specific examples of the technique are illustrated for codes over F3, F4, and F5  相似文献   

2.
高健  王永康 《电子学报》2020,48(2):296-302
纠错码是提高信息传输效率与可靠性的重要手段.构造性能良好的线性码类是纠错码研究中的一个基本问题.本文主要讨论了有限非链环Fq[v]/(vm-v)上自对偶常循环码的代数结构,包括Euclidean自对偶常循环码、Hermitian自对偶常循环码以及Hermitian自对偶常循环码的极大距离可分(MDS)码.本文给出了环Fq[v]/(vm-v)上常循环码是Euclidean自对偶码的充分条件,以及是Hermitian自对偶码的充要条件,并利用Gray映射构造了有限域Fq上一些参数较好的自对偶码.特别地,本文得到了有限域F192上一个新的参数为[16,8,6]的Hermitian自对偶码.  相似文献   

3.
Optimal double circulant self-dual codes over F4 have been found for each length n⩽40. For lengths n⩽14, 20, 22, 24, 28, and 30, these codes are optimal self-dual codes. For length 26, the code attains the highest known minimum weight. For n⩾32, the codes presented provide the highest known minimum weights. The [36,18,12] self-dual code improves the lower bound on the highest minimum weight for a [36,18] linear code  相似文献   

4.
Cyclic codes and self-dual codes over F2+uF2   总被引:1,自引:0,他引:1  
We introduce linear cyclic codes over the ring F2+uF 2={0,1,u,u¯=u+1}, where u2=0 and study them by analogy with the Z4 case. We give the structure of these codes on this new alphabet. Self-dual codes of odd length exist as in the case of Z4-codes. Unlike the Z4 case, here free codes are not interesting. Some nonfree codes give rise to optimal binary linear codes and extremal self-dual codes through a linear Gray map  相似文献   

5.
Previously, Type II codes over F4 have been introduced as Euclidean self-dual codes with the property that all Lee weights are divisible by four. In this paper, a number of properties of Type II codes are presented. We construct several extremal Type II codes and a number of extremal Type I codes. It is also shown that there are seven Type II codes of length 12, up to permutation equivalence  相似文献   

6.
高健  吕京杰 《电子学报》2018,46(7):1768-1773
定义了Z4×(F2+uF2)上的循环码,明确了一类循环码的生成元结构,给出了该类循环码的极小生成元集.利用Gray映射,构造了一些二元非线性码.  相似文献   

7.
Decoding the Golay codes   总被引:1,自引:0,他引:1  
We introduce exceptionally simple decoding algorithms for the two extended Golay codes. The algorithms are based on recent methods of Conway and Curtis of finding the unique blocks containing five points in either the(5,8,24)Steiner system or the(5,6,12)Steiner system. These decoding methods are simple enough to enable decoding extended Golay codes by hand. Both of the methods involve relations between the extended Golay codes and other self-dual codes. Proofs are given explaining these relationships and why the decoding methods work. The decoding algorithms are explained and illustrated with many examples.[3, chap.12]has facts about the Mathieu group and some details about decoding the Golay codes.  相似文献   

8.
Low-complexity ML decoding for convolutional tail-biting codes   总被引:1,自引:0,他引:1  
Recently, a maximum-likelihood (ML) decoding algorithm with two phases has been proposed for convolutional tailbiting codes [1]. The first phase applies the Viterbi algorithm to obtain the trellis information, and then the second phase employs the algorithm A* to find the ML solution. In this work, we improve the complexity of the algorithm A* by using a new evaluation function. Simulations showed that the improved A* algorithm has over 5 times less average decoding complexity in the second phase when Eb/N0? 4 dB.  相似文献   

9.
Hattori  M. Saitoh  Y. 《Electronics letters》1994,30(13):1041-1042
Punctured convolutional codes of rates k1/n and k2 /n are applied to |u|u+v construction, and then a superimposed code of rate (k1+k2)/(2n) is constructed. A suboptimal decoding procedure is presented for the superimposed codes, and it reduces the decoding complexity as compared with maximum likelihood decoding for the known convolutional codes  相似文献   

10.
In this paper, we introduce stopping sets for iterative row-column decoding of product codes using optimal constituent decoders. When transmitting over the binary erasure channel (BEC), iterative row-column decoding of product codes using optimal constituent decoders will either be successful, or stop in the unique maximum-size stopping set that is contained in the (initial) set of erased positions. Let Cp denote the product code of two binary linear codes Cc and Cr of minimum distances dc and dr and second generalized Hamming weights d2(Cc) and d2(Cr), respectively. We show that the size smin of the smallest noncode- word stopping set is at least mm(drd2(Cc),dcd2(Cr)) > drdc, where the inequality follows from the Griesmer bound. If there are no codewords in Cp with support set S, where S is a stopping set, then S is said to be a noncodeword stopping set. An immediate consequence is that the erasure probability after iterative row-column decoding using optimal constituent decoders of (finite-length) product codes on the BEC, approaches the erasure probability after maximum-likelihood decoding as the channel erasure probability decreases. We also give an explicit formula for the number of noncodeword stopping sets of size smin, which depends only on the first nonzero coefficient of the constituent (row and column) first and second support weight enumerators, for the case when d2(Cr) < 2dr and d2(Cc) < 2dc. Finally, as an example, we apply the derived results to the product of two (extended) Hamming codes and two Golay codes.  相似文献   

11.
有限域上线性互补对偶(LCD)码有良好的相关特性和正交特性,并能够防御信道攻击。自正交码是编码理论中一类非常重要的码,可以用于构造量子纠错码。该文研究了有限域F3上的LCD码。通过选取4种合适的定义集,利用有限域F3上线性码是LCD码或自正交码的判定条件,构造了4类3元LCD码和一些自正交码,并研究了这4类线性码的对偶码,得到了一些3元最优线性码。  相似文献   

12.
General results on automorphisms of self-dual binary codes are given. These results are applied to the study of extremal self-dual doubly even binary codes of length48. The main theorem proved is that an extremal self-dual doubly even code of length48with a nontrivial automorphism of odd order is equivalent to the extended quadratic residue code. Interesting constructions of the binary extended Golay code as well as a conjecture about a possible connection between an extremal self-dual doubly even code of length72and an extremal quaternary code of length24arc yielded by techniques used in the proof.  相似文献   

13.
A 2-adic approach to the analysis of cyclic codes   总被引:2,自引:0,他引:2  
This paper describes how 2-adic numbers can be used to analyze the structure of binary cyclic codes and of cyclic codes defined over Z 2(a), a⩾2, the ring of integers modulo 2a. It provides a 2-adic proof of a theorem of McEliece that characterizes the possible Hamming weights that can appear in a binary cyclic code. A generalization of this theorem is derived that applies to cyclic codes over Z2(a) that are obtained from binary cyclic codes by a sequence of Hensel lifts. This generalization characterizes the number of times a residue modulo 2a appears as a component of an arbitrary codeword in the cyclic code. The limit of the sequence of Hensel lifts is a universal code defined over the 2-adic integers. This code was first introduced by Calderbank and Sloane (1995), and is the main subject of this paper. Binary cyclic codes and cyclic codes over Z2(a) are obtained from these universal codes by reduction modulo some power of 2. A special case of particular interest is cyclic codes over Z4 that are obtained from binary cyclic codes by means of a single Hensel lift. The binary images of such codes under the Gray isometry include the Kerdock, Preparata, and Delsart-Goethals codes. These are nonlinear binary codes that contain more codewords than any linear code presently known. Fundamental understanding of the composition of codewords in cyclic codes over Z4 is central to the search for more families of optimal codes. This paper also constructs even unimodular lattices from the Hensel lift of extended binary cyclic codes that are self-dual with all Hamming weights divisible by 4. The Leech lattice arises in this way as do extremal lattices in dimensions 32 through 48  相似文献   

14.
Certain notorious nonlinear binary codes contain more codewords than any known linear code. These include the codes constructed by Nordstrom-Robinson (1967), Kerdock (1972), Preparata (1968), Goethals (1974), and Delsarte-Goethals (1975). It is shown here that all these codes can be very simply constructed as binary images under the Gray map of linear codes over Z4, the integers mod 4 (although this requires a slight modification of the Preparata and Goethals codes). The construction implies that all these binary codes are distance invariant. Duality in the Z4 domain implies that the binary images have dual weight distributions. The Kerdock and “Preparata” codes are duals over Z4-and the Nordstrom-Robinson code is self-dual-which explains why their weight distributions are dual to each other. The Kerdock and “Preparata” codes are Z4-analogues of first-order Reed-Muller and extended Hamming codes, respectively. All these codes are extended cyclic codes over Z4, which greatly simplifies encoding and decoding. An algebraic hard-decision decoding algorithm is given for the “Preparata” code and a Hadamard-transform soft-decision decoding algorithm for the I(Kerdock code. Binary first- and second-order Reed-Muller codes are also linear over Z4 , but extended Hamming codes of length n⩾32 and the Golay code are not. Using Z4-linearity, a new family of distance regular graphs are constructed on the cosets of the “Preparata” code  相似文献   

15.
Message-passing iterative decoders for low-density parity-check (LDPC) block codes are known to be subject to decoding failures due to so-called pseudocodewords. These failures can cause the large signal-to-noise ratio (SNR) performance of message-passing iterative decoding to be worse than that predicted by the maximum-likelihood (ML) decoding union bound.   相似文献   

16.
In this correspondence, the bit-error probability Pb for maximum-likelihood decoding of binary linear block codes is investigated. The contribution Pb(j) of each information bit j to Pb is considered and an upper bound on Pb(j) is derived. For randomly generated codes, it is shown that the conventional approximation at high SNR Pb≈(dH/N).Ps, where Ps represents the block error probability, holds for systematic encoding only. Also systematic encoding provides the minimum Pb when the inverse mapping corresponding to the generator matrix of the code is used to retrieve the information sequence. The bit-error performances corresponding to other generator matrix forms are also evaluated. Although derived for codes with a generator matrix randomly generated, these results are shown to provide good approximations for codes used in practice. Finally, for soft-decision decoding methods which require a generator matrix with a particular structure such as trellis decoding, multistage decoding, or algebraic-based soft-decision decoding, equivalent schemes that reduce the bit-error probability are discussed. Although the gains achieved at practical bit-error rates are only a fraction of a decibel, they remain meaningful as they are of the same orders as the error performance differences between optimum and suboptimum decodings. Most importantly, these gains are free as they are achieved with no or little additional circuitry which is transparent to the conventional implementation  相似文献   

17.
An upper bound on the bit-error probability (BEP) of a linear cyclic code over GF(2l) with hard-decision (HD) maximum-likelihood (ML) decoding on memoryless symmetric channels is derived. Performance results are presented for Reed-Solomon codes on GF(32), GF(64), and GF(128). Also, a union upper bound on the BEP of a linear cyclic code with either hard- or soft-decision ML decoding is developed, as well as the corresponding bounds for the extended code of a linear cyclic code. Using these bounds, which are tight at low bit error rate, the performance advantage of soft-decision (SD) ML and HD ML over bounded-distance (BD) decoding is established  相似文献   

18.
In this letter, we present a new maximum likelihood (ML) decoding algorithm for space time block codes (STBCs) that employ multidimensional constellations. We start with a lattice representation for STBCs which transforms complex channel models into real matrix equations. Based on the lattice representation, we propose a new decoding algorithm for quasiorthogonal STBCs (QO-STBC) which allows simpleML decoding with performance identical to the conventional ML decoder. Multidimensional rotated constellations are constructed for the QO-STBCs to achieve full diversity. As a consequence, for quasi-orthogonal designs with an arbitrary number of transmit antennas N (N ? 4), the proposed decoding scheme achieves full rate and full diversity while reducing the decoding complexity from ∂(McN/2) to ∂(McN/4) in a Mc-QAM constellation.  相似文献   

19.
We propose an algorithm for bounded minimum distance decoding of (partial) unit memory codes up to half the “designed” extended row distance. It makes use of a reduced trellis with the nodes found by bounded minimum distance decoding of the block codes used in the unit memory code. The results can be extended to general multimemory codes. The complexity of this algorithm is upper bounded by 2(d¯ 1r-2dα) times the complexity of the bounded minimum distance decoder of the block codes in the unit memory code. Here dα is the linear increase of the designed extended row distance d¯ir  相似文献   

20.
Soft-decision decoding algorithms of binary linear block codes require reordering of the received symbols within each block in decreasing reliability. Efficient decoding algorithms based on reordering have been devised. This paper presents different results related to the ordering of a sequence of N received symbols with respect to their reliability measure, for BPSK transmission over the AWGN channel model. First, a tight approximation of Pe(i; N), the probability that the hard decision associated with the ith symbol of the ordered sequence is in error, is derived. Then, it is shown that despite the fact that the random variables representing the noise at positions n1, n2,...,nj of the ordering are no longer independent, the events of having a hard decision decoding error at these positions remain almost independent. Pe(n1,n2 ,...,nj; N), the probability that the hard decisions associated with the symbols at positions n1, n2,...nj in the ordered sequence are in error, is thus well approximated from each of the Pe (ni; N), for i∈[1,j]. Finally, based on the independence of these events, the fully connected 2N-state BSC representing the channel after ordering is simplified by N independent time-shared 2-state BSCss. This new model allows one to easily and tightly approximate the capacity of the channel after ordering  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号