首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Codes over algebraic integer rings of cyclotomic fields   总被引:1,自引:0,他引:1  
Regarding any finite field as a residue field of the algebraic integer ring of a cyclotomic field, we select a system of representatives in the ring with minimal Manhattan metric, and introduce a Mannheim weight on the finite field. The linear codes over the finite field with the Mannheim weight are discussed. A geometric method to compute the representatives in Gaussian integers is provided.  相似文献   

2.
The Lee metric measures the circular distance between two elements in a cyclic group and is particularly appropriate as a measure of distance for data transmission under phase-shift-keying modulation over a white noise channel. In this paper, using newly derived properties on Newton?s identities, we initially investigate the Lee distance properties of a class of BCH codes and show that (for an appropriate range of parameters) their minimum Lee distance is at least twice their designed Hamming distance. We then make use of properties of these codes to devise an efficient algebraic decoding algorithm that successfully decodes within the above lower bound of the Lee error-correction capability. Finally, we propose an attractive design for the corresponding VLSI architecture that is only mildly more complex than popular decoder architectures under the Hamming metric; since the proposed architecture can also be used for decoding under the Hamming metric without extra hardware, one can use the proposed architecture to decode under both distance metrics (Lee and Hamming).  相似文献   

3.
In this paper, a new, soft two-level approach for the generation of multiple and revocable biometric keys, adapted to the analog nature of biometric signals, is proposed. It consists of a novel randomized soft code-offset construction for the Euclidean metric, at the first level, and a code-redundancy construction for the Hamming metric, possibly based on a Reed-Solomon code, at the second level. The Shannon entropy analysis shows that the new construction achieves optimal security with respect to biometric template protection, whereas the previously proposed constructions for the Euclidean metric are shown to be insecure in the multiple-key setting. In addition, a general code-offset construction for the Hamming metric is analyzed in terms of the Shannon entropy instead of the usual min entropy. This allows a nice characterization of the codes that provide biometric template protection in the multiple-key scenario as well as a further differentiation among these codes with respect to the achievable security level.  相似文献   

4.
We study here the use of tree codes to encode time-discrete memoryless sources with respect to a fidelity criterion. An easily instrumented scheme is proposed for use with binary sources and the Hamming distortion metric. Results of simulation with random and convolutional codes are given.  相似文献   

5.
Wu  X.-W. Kuijper  M. Udaya  P. 《Electronics letters》2007,43(15):820-821
Algebraic-geometric (AG) codes over finite fields with respect to the Lee metric have been studied. A lower bound on the minimum Lee distance is derived, which is a Lee-metric version of the well-known Goppa bound on the minimum Hamming distance of AG codes. The bound generalises a lower bound on the minimum Lee distance of Lee-metric BCH and Reed-Solomon codes, which have been successfully used for protecting against bitshift and synchronisation errors in constrained channels and for error control in partial-response channels.  相似文献   

6.
The search for perfect error-correcting codes has received intense interest since the seminal work by Hamming. Decades ago, Golomb and Welch studied perfect codes for the Lee metric in multidimensional torus constellations. In this work, we focus our attention on a new class of four-dimensional signal spaces which include tori as subcases. Our constellations are modeled by means of Cayley graphs defined over quotient rings of Lipschitz integers. Previously unexplored perfect codes of length one will be provided in a constructive way by solving a typical problem of vertices domination in graph theory. The codewords of such perfect codes are constituted by the elements of a principal (left) ideal of the considered quotient ring. The generalization of these techniques for higher dimensional spaces is also considered in this work by modeling their signal sets through Cayley-Dickson algebras.  相似文献   

7.
An algebraic methodology for defining new metrics over two-dimensional signal spaces is presented in this work. We have mainly considered quadrature amplitude modulation (QAM) constellations which have previously been modeled by quotient rings of Gaussian integers. The metric over these constellations, based on the distance concept in circulant graphs, is one of the main contributions of this work. A detailed analysis of some degree-four circulant graphs has allowed us to detail the weight distribution for these signal spaces. A new family of perfect codes over Gaussian integers will be defined and characterized by providing a solution to the perfect t-dominating set problem over the circulant graphs presented. Finally, we will show how this new metric can be extended to other signal sets by considering hexagonal constellations and circulant graphs of degree six.  相似文献   

8.
A methodology is presented for the design and development of efficient trellis-based soft decision decoders for extended Hamming and BCH codes. A new metric for noncoherent discriminator detection is proposed that substantially improves the performance of trellis-based decoders over additive white Gaussian noise (AWGN) channels. Minimal edge trellises are then presented for the class of extended Hamming codes and the (32, 21) extended BCH code. The latter is in extensive use in narrow-band wireless data systems. An automatic request (ARQ) protocol is described that allows the soft decision decoders to outperform their hard decision counterparts in both reliability and throughput  相似文献   

9.
This paper presents a family of concatenated two-state trellis-coded modulation (CT-TCM) schemes. Compared with the existing turbo-type bandwidth-efficient coded modulation schemes, the proposed codes have significantly reduced complexity without sacrificing performance. A joint design strategy for all component codes is established. This leads to so-called asymmetrical and time-varying trellis structures, which possess good Hamming and Euclidean distance distributions. The performance of the proposed codes is demonstrated by simulation results.  相似文献   

10.
This paper proposes the Low Density Parity Check (LDPC) coded Filtered MultiTone (FMT) systems with high-order modulation for the high data rate reliable transmission over frequency selective fading channel. For the purpose of accomplishing soft input soft output iterative decoding of LDPC codes, a new soft decision metric generation method is proposed, which obviates the need of the noise variance estimation, for M-PSK/M-QAM-type high-order modulation over frequency selective fading channel. Computer simulation indicates that, there is no performance loss with our new metric, but the complexity of implementation is reduced, and that the LDPC codes are effective to improve the Bit Error Rate (BER) of FMT in frequency selective fading channel.  相似文献   

11.
We derive the Gilbert-Varshamov and Hamming bounds for packings of spheres (codes) in the Grassmann manifolds over R and C. Asymptotic expressions are obtained for the geodesic metric and projection Frobenius (chordal) metric on the manifold.  相似文献   

12.
A code of integers into binary sequences is called a difference-preserving code (DP code) if it has the following two properties: 1) if the absolute value of the difference between two integers is less than or equal to a certain threshold, the Hamming distance between their codewords is equal to this value and 2) if the absolute value of the difference between two integers exceeds the threshold, then the Hamming distance between their codewords also exceeds this threshold. Such codes (or slight modifications thereof) have also been called path codes, circuit codes, or snake-in-the-box codes. This paper discusses the application of DP codes to pattern recognition and classification problems and presents a construction of efficient DP codes whose information content is asymptotically (in the length of codewords) of the order of theoretical upper bounds.  相似文献   

13.
Codes over the ring of integers modulo 4 have been studied by many researchers. Negacyclic codes such that the length n of the code is odd have been characterized over the alphabet Zopf4, and furthermore, have been generalized to the case of the alphabet being a finite commutative chain ring. In this paper, we investigate negacyclic codes of length 2s over Galois rings. The structure of negacyclic codes of length 2s over the Galois rings GR(2a,m), as well as that of their duals, are completely obtained. The Hamming distances of negacyclic codes over GR(2a,m) in general, and over Zopf2 a in particular are studied. Among other more general results, the Hamming distances of all negacyclic codes over Zopf2 a of length 4,8, and 16 are given. The weight distributions of such negacyclic codes are also discussed  相似文献   

14.
Rate 1/2 convolutional codes over the ring of integers modulo M are combined with M-ary continuous phase modulation (CPM) schemes whose modulation indices are of the form h=1/M. An M-ary CPM scheme with h=1/M can be modeled by a continuous-phase encoder (CPE) followed by a memoryless modulator (MM), where the CPE is linear over the ring of integers modulo M. The fact that the convolutional code and the CPE are over the same algebra allows the state of the CPE to be fed back and used by the convolutional encoder. A modified Euclidean distance function that substantially simplifies the search for good codes has been derived and used to find new codes. Numerical results show that this approach consistently improves the performance as compared to coded schemes using binary convolutional codes with the same decoding complexity  相似文献   

15.
Codes with full information rate (optimal), for example Hamming codes, provide the highest possible code rate R (R = k/n where k and n are the code dimension and length respectively) and it is an important property for a block code. Recently, the Systematic Distance-4 (SD-4) codes are proposed that allows generating all the optimal Hamming distance-4 binary linear block codes. Continuous Phase Frequency Shift Keying (CPFSK) provides low spectral occupancy and is suitable for power and bandwidth-limited channels such as satellite communication channels. MIMO technique is essential for modern wireless communication systems. In this article, we evaluated the error performances of SD-4 codes utilizing CPFSK modulation over MIMO Rician and Rayleigh channels via computer simulations and obtained outstanding results regarding coding gain.  相似文献   

16.
The integration of channel coding and modulation in a communication system to increase the Euclidean distance between modulated signals is analyzed. Systems using binary continuous-phase frequency-shift keying modulation and some block codes, such as Hamming codes and shortened Hamming codes, are considered. It is shown that the minimum Euclidean distance depends on the configuration of the parity-check matrixHof the code. For the examined codes the optimum configurations ofH, which give the maximum values of the minimum Euclidean distance, are determined.  相似文献   

17.
Trellis decoding of linear block codes in a Rayleigh fading channel is discussed. Two methods for calculating metric values for each bit in a received block are considered: the values are calculated from the received signal envelope sample and from the demodulator output. Bit error rate (BER) performances of hard decision and trellis decoding are compared using Hamming (7, 4) and Golay (24, 12) codes in computer simulations and laboratory experiments. A simplified trellis decoding algorithm, in which the hard decision output of a bit with an envelope sample greater than the threshold value is accepted as correct, is presented. Laboratory experimental results for trellis decoding in combination with Gaussian minimum-shift-keying (GMSK) modulation and frequency detection are shown. The effect of n-bit A/D-conversion in signal envelope sampling is investigated experimentally. The results show that the trellis decoding algorithm improves BER performance  相似文献   

18.
Certain notorious nonlinear binary codes contain more codewords than any known linear code. These include the codes constructed by Nordstrom-Robinson (1967), Kerdock (1972), Preparata (1968), Goethals (1974), and Delsarte-Goethals (1975). It is shown here that all these codes can be very simply constructed as binary images under the Gray map of linear codes over Z4, the integers mod 4 (although this requires a slight modification of the Preparata and Goethals codes). The construction implies that all these binary codes are distance invariant. Duality in the Z4 domain implies that the binary images have dual weight distributions. The Kerdock and “Preparata” codes are duals over Z4-and the Nordstrom-Robinson code is self-dual-which explains why their weight distributions are dual to each other. The Kerdock and “Preparata” codes are Z4-analogues of first-order Reed-Muller and extended Hamming codes, respectively. All these codes are extended cyclic codes over Z4, which greatly simplifies encoding and decoding. An algebraic hard-decision decoding algorithm is given for the “Preparata” code and a Hadamard-transform soft-decision decoding algorithm for the I(Kerdock code. Binary first- and second-order Reed-Muller codes are also linear over Z4 , but extended Hamming codes of length n⩾32 and the Golay code are not. Using Z4-linearity, a new family of distance regular graphs are constructed on the cosets of the “Preparata” code  相似文献   

19.
A generalization of McEliece's theorem on the p-adic valuation of Hamming weights of words in cyclic codes is proved in this paper by means of counting polynomial techniques introduced by Wilson along with a technique known as trace-averaging introduced here. The original theorem of McEliece concerned cyclic codes over prime fields. Delsarte and McEliece later extended this to Abelian codes over finite fields. Calderbank, Li, and Poonen extended McEliece's original theorem to cover cyclic codes over the rings Zopf2 d, Wilson strengthened their results and extended them to cyclic codes over Zopf p d, and Katz strengthened Wilson's results and extended them to Abelian codes over Zopfp d. It is natural to ask whether there is a single analogue of McEliece's theorem which correctly captures the behavior of codes over all finite fields and all rings of integers modulo prime powers. In this paper, this question is answered affirmatively: a single theorem for Abelian codes over Galois rings is presented. This theorem contains all previously mentioned results and more  相似文献   

20.
A 2-adic approach to the analysis of cyclic codes   总被引:2,自引:0,他引:2  
This paper describes how 2-adic numbers can be used to analyze the structure of binary cyclic codes and of cyclic codes defined over Z 2(a), a⩾2, the ring of integers modulo 2a. It provides a 2-adic proof of a theorem of McEliece that characterizes the possible Hamming weights that can appear in a binary cyclic code. A generalization of this theorem is derived that applies to cyclic codes over Z2(a) that are obtained from binary cyclic codes by a sequence of Hensel lifts. This generalization characterizes the number of times a residue modulo 2a appears as a component of an arbitrary codeword in the cyclic code. The limit of the sequence of Hensel lifts is a universal code defined over the 2-adic integers. This code was first introduced by Calderbank and Sloane (1995), and is the main subject of this paper. Binary cyclic codes and cyclic codes over Z2(a) are obtained from these universal codes by reduction modulo some power of 2. A special case of particular interest is cyclic codes over Z4 that are obtained from binary cyclic codes by means of a single Hensel lift. The binary images of such codes under the Gray isometry include the Kerdock, Preparata, and Delsart-Goethals codes. These are nonlinear binary codes that contain more codewords than any linear code presently known. Fundamental understanding of the composition of codewords in cyclic codes over Z4 is central to the search for more families of optimal codes. This paper also constructs even unimodular lattices from the Hensel lift of extended binary cyclic codes that are self-dual with all Hamming weights divisible by 4. The Leech lattice arises in this way as do extremal lattices in dimensions 32 through 48  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号