首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Two DC-free codes are presented with distance 2d, b ⩾1 length 2n+2r(d-1) for d⩽3 and length 2n+2r(d-1)(2d -1) for d>3, where r is the least integer ⩾log2 (2n+1). For the first code l=4, c=2, and the asymptotic rate of this code is 0.7925. For the second code l=6, c=3, and the asymptotic rate of this code is 0.8858. Asymptotically, these rates achieve the channel capacity. For small values of n these codes do not achieve the best rate. As an example of codes of short length with good rate, the author presents a (30, 10, 6, 4) DC-free block code with 221 codewords. A construction is presented for which from a given code C 1 of length n, even weight, and distance 4, the author obtains a (4n, l, c, 4) DC-free block code C2, where l is 4, 5 or 6, and c is not greater than n+1 (but usually significantly smaller). The codes obtained by this method have good rates for small lengths. The encoding and decoding procedures for all the codes are discussed  相似文献   

2.
A center-fed, solid, circular cylindrical dipole of radius a with feed gap of width 2d radiating in a circular waveguide of radius b terminated in infinite ground planes is rigorously analyzed by applying both the conservation-of-complex-power technique and the multiple-reflections technique. The analysis begins by studying the dependence of the dipole admittance on its feed gap width and on its length, 2l, as well as on b, with ka (k=2π/λ is the number) as a parameter. From the decreasing amplitudes of the almost periodic oscillations of these input admittances as b/λ is increased, the input admittances of dipoles radiating in free space (b→∞) are estimated using a variable-bound approach. The effect of gap width (d/a⩽5) for different lengths of dipoles (0.2⩽2l/λ⩽1) in free space and for different thicknesses (ka⩽0.2) is then established. The feed gap dependence for a half-wave dipole is also examined in detail for d /a⩽10 and ka⩽0.14  相似文献   

3.
A binary, linear block code C with block length n and dimension n is commonly denoted by [n, k] or, if its minimum distance is d, by [n, k,d]. The code's covering radius r(C) can be defined as the smallest number r such that any binary column vector of length (n-k) can be written as a sum of r or fewer columns of a parity-check matrix of C. An [n,k] code with covering radius r is denoted by [n,k]r. R.A. Brualdi et al., (1989) showed that l(m,r) is defined to be the smallest n such that an [n,n-m]r code exists. l(m,2) is known for m⩽6, while it is shown by Brualdi et al. that 17⩽l(7,2)⩽19. This lower bound is improved by A.R. Calderbank et al. (1988), where it is shown that [17,10]2 codes do not exist. The nonexistence of [18,11]2 codes is proved, so that l(7,2)=19. l[7.2)=19 is established by showing that [18,11]2 codes do not exist. It is also shown that [64,53]2 codes do not exist, implying that l(11,2)⩾65  相似文献   

4.
A (2n, k, l, c, d) DC free binary block code is a code of length 2n, constant weight n, 2k codewords, maximum runlength of a symbol l , maximum accumulated charge c, and minimum distance d . The purpose of this code is to achieve DC freeness and error correction at the same time. The goal is to keep the rate k/2 n and d large and l and c small. Of course, these are conflicting goals. H.C. Ferreira (IEEE Trans. Magn., vol.MAG-20, no.5, p.881-3, 1984) presented a (16, 8, 8, 5, 4) DC free code. Here, a (16, 9, 6, 5, 4) DC free code is presented. Easy encoding and decoding algorithms are also given  相似文献   

5.
Let X be a discrete random variable drawn according to a probability mass function p(x), and suppose p(x), is dyadic, i.e., log(1/p(x)) is an integer for each x. It is shown that the binary code length assignment l(x)=log(1/p(x)) dominates any other uniquely decodable assignment l'(x) in expected length in the sense that El(X)<El'(X), indicating optimality in long run performance (which is well known), and competitively dominates l'(x), in the sense that Pr{ l (X)<l'(X)}>Pr{l ( X)>l'(X)}, which indicates l is also optimal in the short run. In general, if p is not dyadic then l=[log 1/p] dominates l'+1 in expected length and competitivity dominates l'+1, where l' is any other uniquely decodable code  相似文献   

6.
Short codes with a given covering radius   总被引:1,自引:0,他引:1  
The covering radius r of a code is the maximum distance from any vector in the space containing the code to the nearest codeword. The authors introduce a new function l(m,r), called the length function, which equals the smallest length of a binary code of codimension m and covering radius r. They investigate basic properties of the length function. Projective geometries over larger fields are used to construct families of codes which improve significantly the upper bound for l(m,2) obtained by amalgamation of Hamming codes. General methods are developed for ruling out the existence of codes of covering radius 2 with a given codimension and length resulting in lower bounds for l(m,2). A table is presented which gives the best results now known for l(m,r) with m⩽12 and r⩽12  相似文献   

7.
Let an [n, k, d]-code denote a binary linear code of length n, dimension k, and minimum distance at least d. Define d(n, k) as the maximum value of d for which there exists a binary linear [n, k, d]-code. T. Verhoeff (1989) has provided an updated table of bounds on d(n, k) for 1⩽kn⩽127. The authors improve on some of the upper bounds given in that table by proving the nonexistence of codes with certain parameters  相似文献   

8.
The electromagnetic coupling of two crossed thin wires of infinite length is considered. Two coupled integral equations are obtained, given in terms of generalized impedance functions, for the spectral currents flowing in each wire. The wires may be in a homogeneous medium or over a half-space. The numerical implementation focuses, however, only on the former. The numerical solution may be obtained by either applying moment or multiple scattering methods. The solution obtained from the method of moments is applicable for any wire spacing. Obversely, the multiple scattering method leads to a convenient matrix series solution, which shows that the coupling between wires is proportional to 1/d 2 (where d is the wire separation) plus higher order scattering terms  相似文献   

9.
Two results are presented concerning the partial periods (p-p's) of an m-sequence of period 2n-1. The first proves the existence of an m-sequence whose p-p's of length approximately (n+d log2 n) have minimum distance between d and 2d for small d. The second result is of an asymptotic nature and proves that the normalized minimum distance of p-p's whose length is any fraction of the period of the m-sequence, approaches 1/2 as the period of m-sequence tends to infinity  相似文献   

10.
nq(k,d), the length of a q-ary optimum code for given k and d, for q=4 and k=3, 4 is discussed. The problem is completely solved for k=3, and the exact value of n4(4,d) is determined for all but 52 values of d  相似文献   

11.
12.
A digital control algorithm for the three-phase sinusoidal voltage inverter with an output LC filter has been developed. To take the transient of the LC filter during the discretization time into consideration, a fourth-order matrix state equation of the current and the voltage on the d-q frame is discretized. Precise discrete equations for the inverter are introduced. Using these equations, a deadbeat controller consisting of a d-g current minor loop and a d-q voltage major loop, with precise decoupling of the d-q components, was developed. The voltage major loop controller assures the sinusoidal output voltage and stabilizes the system. A deadbeat controller is used because both the current minor loop and the voltage major loop can used one sampling response. The validity of these techniques is confirmed by simulation studies. This method is expected to be useful for direct digital control of large-capacity sinusoidal voltage inverters using low-switching-frequency devices  相似文献   

13.
The author investigates the properties of minimal distance lexicographic codes, or lexicode, over the ordered infinite alphabet N={0,1,2…}. The author presents a method for computing the basis of such a code. It is shown that any lexicographic code S with minimal distance d has a unique basis where each basis vector is a one followed by a string of zeros, followed by d-1 nonzero digits aij. Furthermore, the matrix A=(aij) has no singular minors over the nim-field. The dual code when S has finite length is also computed. The author develops a systematic approach to determine which words belong to these lexicodes  相似文献   

14.
A new upper bound on the minimal distance of self-dual codes   总被引:9,自引:0,他引:9  
It is shown that the minimal distance d of a binary self-dual code of length n⩾74 is at most 2[(n+6)/10]. This bound is a consequence of some new conditions on the weight enumerator of a self-dual code obtained by considering a particular translate of the code, called its shadow. These conditions also enable one to find the highest possible minimal distance of a self-dual code for all n⩾60; to show that self-dual codes with d⩽6 exist precisely for n⩾22, with d ⩾8 exist precisely for n=24, 32 and n⩾26, and with d⩾10 exist precisely for n⩾46; and to show that there are exactly eight self-dual codes of length 32 with d=8. Several of the self-dual codes of length 34 have trivial group (this appears to be the smallest length where this can happen)  相似文献   

15.
For n>0, d⩾0, nd (mod 2), let K(n, d) denote the minimal cardinality of a family V of ±1 vectors of dimension n, such that for any ±1 vector w of dimension n there is a vV such that |v- w|⩽d, where v-w is the usual scalar product of v and w. A generalization of a simple construction due to D.E. Knuth (1986) shows that K(n , d)⩽[n/(d+1)]. A linear algebra proof is given here that this construction is optimal, so that K(n, d)-[n/(d+1)] for all nd (mod 2). This construction and its extensions have applications to communication theory, especially to the construction of signal sets for optical data links  相似文献   

16.
A decoding algorithm for codes arising from algebraic curves explicitly constructable by Goppa's construction is presented. Any configuration up to the greatest integer less than or equal to (d *-1)/2 errors is corrected by the algorithm whenever d*⩾6g, where d* is the designed minimum distance of the code and g is the genus of the curve. The algorithm's complexity is at most O((d*)2 n), where n denotes the length of the code. Application to Hermitian codes and connections with well-known algorithms are explained  相似文献   

17.
The application of a combined test-error-correcting procedure is studied to improve the mean time to failure (MTTF) for degrading memory systems with defects. The degradation is characterized by the probability p that within a unit of time a memory cell changes from the operational state to the permanent defect state. Bounds are given on the MTTF and it is shown that, for memories with N words of k information bits, coding gives an improvement in MTTF proportional to (k/n) N(dmin-2)/(dmin -1), where dmin and (k/n) are the minimum distance and the efficiency of the code used, respectively. Thus the time gain for a simple minimum-distance-3 is proportional to N-1. A memory word test is combined with a simple defect-matching code. This yields reliable operation with one defect in a word of length k+2 at a code efficiency k/(k+2)  相似文献   

18.
19.
It is well-known that there exists a unique shift l of the m-sequence S(k) such that the value of S0(k)=S(k+l) is only determined by the cyclotomic coset to which k belongs. A measure called the `coset correlation' is introduced. It is proven that the shift l can be determined by the coset correlation  相似文献   

20.
Whether quasi-perfect codes are normal is addressed. Let C be a code of length n, dimension k, covering radius R, and minimal distance d. It is proved that C is normal if d⩾2R-1. Hence all quasi-perfect codes are normal. Consequently, any [n,k ]R binary linear code with minimal distance d⩾2R-1 is normal  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号