共查询到20条相似文献,搜索用时 0 毫秒
1.
Helleseth T. Voloch J.F. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2004,50(9):2154-2155
We give a lower bound for the minimum distance of double circulant binary quadratic residue codes for primes p/spl equiv//spl plusmn/3(mod8). This bound improves on the square root bound obtained by Calderbank and Beenker, using a completely different technique. The key to our estimates is to apply a result by Helleseth, to which we give a new and shorter proof. Combining this result with the Weil bound leads to the improvement of the Calderbank and Beenker bound. For large primes p, their bound is of order /spl radic/(2p) while our new improved bound is of order 2/spl radic/p. The results can be extended to any prime power q and the modifications of the proofs are briefly indicated. 相似文献
2.
The weight distributions of the (13, 6) and the (17, 8) quaternary quadratic residue codes are computed. 相似文献
3.
The weight distributions of some binary quadratic residue codes 总被引:1,自引:0,他引:1
Truong T.-K. Chang Y. Lee C.-D. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2005,51(5):1776-1782
The weight distributions of binary quadratic residue codes C can be computed from the weight distribution of a subset of C containing one-fourth (resp., one-eighth) of the codewords in C when the length of the code is congruent to 1 (resp., -1) modulo 8. An algorithm to determine the weight distributions of binary cyclic codes is given. As a consequence, the weight distributions of (73,37,13), (89,45,17), and (97,49,15) quadratic residue codes are determined precisely. 相似文献
4.
Huffman W.C. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1995,41(2):378-386
We give the full automorphism groups as groups of semiaffine transformations, of the extended generalized quadratic residue codes. We also present a proof of the Gleason-Prange theorem for the extended generalized quadratic residue codes that relies only on their definition and elementary theory of linear characters 相似文献
5.
A novel decoding scheme, called syndrome-weight determination, was proposed by Chang et al. in 2008 for the Golay code, or the (23, 12, 7) quadratic residue code. This method is not only very simple in principle but also suitable for parallel hardware design. Presented is a modified version for any binary quadratic residue codes which has been developed. Because of its regular property, the proposed decoder is suitable for both software design and hardware development. 相似文献
6.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1980,26(2):223-227
Forp eqiv pm 1 pmod{8} there are two binary codes,Q(p) andN(p) , each an extended quadratic residue code of lengthp+1 and dimension(p+1)/2 . The existence of double circulant generator matrices for these codes is investigated. A possibly infinite family of primesp is presented for whichQ(p) andN(p) must have double circulant generator matrices. Two counterexamples prove the construction is not always possible. 相似文献
7.
Xuemin Chen Reed I.S. Truong T.K. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1994,40(1):126-136
The 1/2-rate binary quadratic residue (QR) codes, using binary phase-shift keyed (BPSK) modulation and hard decoding, are presented as an efficient system for reliable communication. Performance results of error correction are obtained both theoretically and by means of computer calculations for a number of binary QR codes. These results are compared with the commonly used 1/2-rate convolutional codes with constraint lengths from 3 to 7 for the hard-decision case. The binary QR codes of different lengths are shown to be equivalent in error-correction performance to some 1/2-rate convolutional codes, each of which has a constraint length K that corresponds to the error-control rate d/n and the minimum distance d of the QR codes 相似文献
8.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(2):407-411
We find the minimum distances of the binary(113, 57) , and ternary(37, 19), (61, 31), (71, 36) , and(73, 37) quadratic residue codes and the corresponding extended codes. These distances are15, 10, 11, 17 , and17 , respectively, for the nonextended codes and are increased by one for the respective extended codes. We also characterize the minimum weight codewords for the(113, 57) binary code and its extended counterpart. 相似文献
9.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1971,17(6):736-742
The burst-trapping error control technique developed by Tong [1] corrects both random and burst errors adaptively. A generalization of this scheme, called generalized burst trapping (GBT), is presented here. Generalized burst-trapping codes (GBTC) also correct both random and burst errors adaptively but, in addition, are capable of correcting random errors in the guard space following a correctable burst. This added capability is obtained at the expense of a longer guard space or a lower rate and a modest increase in complexity of implementation. Nevertheless, these codes are simple to encode and decode and, in particular, the storage-saving technique used with the original burst-trapping codes is directly applicable to the generalized codes. Also it is shown that at most one block of error propagation can occur if a simple and reasonable condition is met. Thus the generalized codes have better propagation properties than the original burst-trapping codes. This new error control technique is well suited to error correction on channels where it cannot be assumed that bursts are isolated events separated by error-free intervals. Thus, for example, this technique appears well suited to error correction on telephone facilities that incorporate multiple-level signaling. 相似文献
10.
Arithmetic coding is a highly efficient lossless source coding technique. Multiplication-free arithmetic coding algorithms provide an excellent tradeoff between operation complexity and coding performance. A whole family of multiplication-free arithmetic codes, which achieve the best coding efficiency and can be used for arbitrary size of alphabets, is derived. The complete tradeoff between the complexity of operations and compression performance of all the algorithms is presented 相似文献
11.
Uchoa-Filho B.F. Souza R.D. Pimentel C. Mao-Chao Lin 《Communications Letters, IEEE》2005,9(12):1070-1072
This letter introduces the class of generalized punctured convolutional codes (GPCCs), which is broader than and encompasses the class of the standard punctured convolutional codes (PCCs). A code in this class can be represented by a trellis module, the GPCC trellis module, whose topology resembles that of the minimal trellis module. he GPCC trellis module for a PCC is isomorphic to the minimal trellis module. A list containing GPCCs with better distance spectrum than the best known PCCs with same code rate and trellis complexity is presented. 相似文献
12.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1981,27(2):181-187
A class of binary error-correcting codes, called generalized tensor product codes, is presented with their decoding algorithm. These codes are constructed by combining a number of codes on various extension fields with shorter binary codes. A general algorithm is provided to do bounded distance decoding for these codes. Simply decodable codes such as Wolf's tensor product codes are shown to be special cases of this class of codes. Simply decodable and more efficient codes than Wolf's codes are also included as special cases. 相似文献
13.
The authors show how the symbolic sequences of same period superstable orbits in 1D quadratic maps are ordered according to Gray codes. Next, the Gray ordering number is introduced, in the interval (0, 1), allowing the simultaneous ordering of symbolic sequences of different period superstable orbits. Likewise, it is shown that Gray ordering number manipulation can determine whether or not a given symbolic sequence exists 相似文献
14.
Convolutions over residue classes of quadratic integers 总被引:1,自引:0,他引:1
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1976,22(4):468-475
A Fourier-like transform is defined over a ring of quadratic integers modulo a prime numberq in the quadratic fieldR(sqrt{m}) , wherem is a square-free integer. Ifq is a Fermat prime, one can utilize the fast Fourier transform (FFT) algorithm over the resulting finite fields to yield fast convolutions of quadratic integer sequences inR(sqrt{m}) . The theory is also extended to a direct sum of such finite fields. From these results, it is shown that Fourier-like transforms can also be defined over the quadratic integers inR( sqrt{m}) modulo a nonprime Fermat number. 相似文献
15.
This paper deals with the problem of quadratic minimization subject to linear equality constraints. Unlike the standard formulation, we assume the most general case of a possibly singular quadratic form. We explain that the existing formal solution to this problem has several drawbacks. Our new approach is free from most of these drawbacks. In particular, it has a simple interpretation and is relatively easy to implement. The practical importance of this result lies in its numerous applications: filter design, spectral analysis, direction finding, and blind deconvolution of multiple FIR channels. Here, we focus on the blind deconvolution application for which we present a novel solution with enhanced performance 相似文献
16.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(2):403-405
We discuss[2(p + 1), p + 1] double circulant codes which are the ternary images of the[p + 1,(p + 1)/2] extended quadratic residue codes over GF(9) . Herep is a prime of the formp = 12k pm 5 . As a special result we obtain a[64, 32,18] ternary self-dual code which is the largest known code meeting the bound of Mallows and Sloane. 相似文献
17.
Pires da Nobrega Neto T. Interlando J.C. Favareto O.M. Elia M. Palazzo R. Jr. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2001,47(4):1514-1527
We propose new classes of linear codes over integer rings of quadratic extensions of Q, the field of rational numbers. The codes are considered with respect to a Mannheim metric, which is a Manhattan metric module a two-dimensional (2-D) grid, in particular, codes over Gaussian integers and Eisenstein-Jacobi integers are extensively studied. Decoding algorithms are proposed for these codes when up to two coordinates of a transmitted code vector are affected by errors of arbitrary Mannheim weight. Moreover, we show that the proposed codes are maximum-distance separable (MDS), with respect to the Hamming distance. The practical interest in such Mannheim-metric codes is their use in coded modulation schemes based on quadrature amplitude modulation (QAM)-type constellations, for which neither the Hamming nor the Lee metric is appropriate 相似文献
18.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1969,15(5):590-592
It is proved that every linear code of dimensionk can be decoded by a threshold decoding circuit that is guaranteed to correcte errors ife leq (d - 1)/2 whered is the minimum distance of the code. Moreover it is demonstrated that the number of levels of threshold logic is less than or equal tok by giving an algorithm for generating the decoding logic employingk levels. 相似文献
19.
Generalized Hamming weights of linear codes 总被引:4,自引:0,他引:4
Helleseth T. Klove T. Ytrehus O. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1992,38(3):1133-1140
The generalized Hamming weight, d r(C ), of a binary linear code C is the size of the smallest support of any r -dimensional subcode of C . The parameter d r(C ) determines the code's performance on the wire-tap channel of Type II. Bounds on d r(C ), and in some cases exact expressions, are derived. In particular, a generalized Griesmer bound for d r(C ) is presented and examples are given of codes meeting this bound with equality 相似文献
20.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1970,16(6):739-745
A one-step threshold decoding method previously presented for cyclic block codes is shown to apply generally to linear convolutional codes. It is further shown that this method generalizes in a natural way to allow decoding of the received sequence in its unquantized analog form. 相似文献