首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
For a digital recording system with a binary modulation encoder and a linearly dispersive channel with additive noise, the author determines optimum mean-square performance of the linear, partial-response, and decision-feedback equalizers. The analysis revolves around the power spectral density A(Ω) of the code and the folded signal-to-noise ratio X(Ω) of the channel. The latter function is analyzed for stylized optical and magnetic recording channels. For all equalizers it is shown that the effect of coding is similar to increasing X(Ω) by an additive portion 1/A(Ω). This favors depressions of A(Ω) at frequencies where X(Ω) is poor. However, for A(Ω) to have any depressions, the signaling rate must be increased with respect to uncoded storage, and this inevitably degrades X(Ω). At high information densities the degradation is often too large for coding to be rewarding. Examples serve to illustrate these results  相似文献   

2.
3.
It is proven that 100-percent efficient fixed-rate codes for run-length-limited (RLL)(d,k)and RLL charge-constrained(d, k; c)channels are possible in only two eases, namely(d,k; c)=(0,1;1)and(1,3;3). Specifically, the binary Shannon capacity of RLL(d, k)constrained systems is shown to be irrational for all values of(d, k),0 leq d < k. For RLL charge-constrained systems with parameters(d, k;c), the binary capacity is irrational for all values of(d, k; c),0 leq d < k,2c geq k + 1, except(0,1; 1)and(1,3;3), which both have binary capacity1/2.  相似文献   

4.
We present a new technique to construct sliding-block modulation codes with a small decoding window. Our method, which involves both state splitting and look-ahead encoding, crucially depends on a new “local” construction method for bounded-delay codes. We apply our method to construct several new codes, all with a smaller decoding window than previously known codes for the same constraints at the same rate  相似文献   

5.
Turbo codes are sensitive to both (timing) synchronization errors and signal-to-noise ratio (SNR) mismatch. Since turbo codes are intended to work in environments with very low SNR, conventional synchronization methods often fail. This paper investigates blind symbol-timing synchronization and SNR estimation based on oversampled data frames. The technique is particularly suitable for low-rate turbo codes operating in additive white Gaussian noise at low SNR and modest data-transfer rates, as in deep space, satellite, fixed wireless, or wireline communications. In accordance with the turbo principle, intermediate decoding results are fed back to the estimator, thereby facilitating decision-directed estimation. The analytical and simulated results show that with three or more samples per symbol and raised cosine-rolloff pulse shaping, performance approaches that of systems with perfect timing and SNR knowledge at the receiver.  相似文献   

6.
《Microelectronics Reliability》2015,55(11):2453-2467
Erasure codes are widely used in data storage systems to protect against disk failures. Employing erasure codes in an array of Solid-State Drives (SSDs) in storage systems necessitates designers to revisit different characteristics in comparison to Hard Disk Drives (HDDs), due to non-mechanical property of SSDs. One of the most important characteristics of SSDs is their limitation on the number of Program/Erase (P/E) cycles. By taking into account the characteristics of SSDs, this paper presents a comprehensive analysis to investigate the effects of three well-known erasure codes on the endurance and performance of SSD-based disk subsystems. The three erasure codes, i.e., Reed–Solomon, EVENODD, and RDP are implemented on the SSD-extension of DiskSim simulator. The results show that the endurance and performance of Reed–Solomon are on average 90% and 60% higher than other erasure codes, respectively. Additionally, the three erasure codes are compared in terms of different stripe unit sizes, number of disks, and various request sizes. The results show that configuring a disk array with a 4 KB stripe unit size will improve the endurance and performance of EVENODD by 1.8 × and 2.9 ×, respectively, as compared to 128 KB stripe unit size.  相似文献   

7.
Channel coding systems that employ linear block codes can be designed according to a mean-square error criterion. The optimum encoder and decoder pair is determined by selecting special elements in a generalized frequency domain based upon the values of key parameters called ratio weights. Systems may be designed that employ either hard or soft decision variables in the decoder. When cyclic codes are used, a minimal ideal decomposition of the code space shows that the ratio weights possess constant values on certain subsets in the frequency domain. This permits a drastic reduction in the number of ratio weights that need to be computed. For a cyclic code withtminimal ideals, this design procedure narrows the search for constancy subsets of the ratio weights to(2^{t}-1)subsets of the general space. Only one ratio weight needs to be computed for each constancy subset.  相似文献   

8.
This letter presents an efficient method for optical code division multiple access (OCDMA) code acquisition based on unipolar optical orthogonal codes. We propose a two-dwell acquisition procedure and provide closed form expressions to analyze the system?s error probabilities. Our results match the Multiple Shift (MS) algorithm, recently introduced in the literature, and show that our procedure can achieve the same system performance with a lower computational complexity.  相似文献   

9.
该文基于AWGN信道研究了SNR失配对T-TCM系统性能的影响。蒙特卡洛仿真结果表明,SNR欠估计偏差不大于4dB时,T-TCM系统性能基本不受影响,更大的SNR估计偏差则会导致系统性能迅速下降;而SNR过估计始终不会造成系统性能折损。该文结合雅可比对数式及迭代译码算法的特点从理论上给出了解释,进一步提出无需SNR估计的T-TCM译码方案,在保证性能没有损失的前提下降低了T-TCM的应用要求与实现复杂度。  相似文献   

10.
In both open and private communication the participants face potential threats from a malicious enemy who has access to the communication channel and can insert messages (impersonation attack) or alter already transmitted messages (substitution attack). Authentication codes (A-codes) have been developed to provide protection against these threats. In this paper we introduce a new distance, called the authentication distance (A-distance), and show that an A-code can be described as a code for the A-distance. The A-distance is directly related to the probability PS of success in a substitution attack. We show how to transform an error-correcting code into an A-code and vice versa. We further use these transformations to provide both upper and lower bounds on the size of the information to be authenticated, and study their asymptotic behavior. As examples of obtained results, we prove that the cardinality of the source state space grows exponentially with the number of keys provided PS>PI, we generalize the square-root bound given by Gilbert, MacWilliams, and Sloane in 1979, and we provide very efficient constructions using concatenated Reed-Solomon codes  相似文献   

11.
A spectrum analysis technique is described which will measure the quantization noise in a digital audio system with a signal present. An estimate of the power density spectrum is interpreted to find the signal to quantization noise ratio. Additional information derived from real life spectrum measurements is explained  相似文献   

12.
何碧贵 《激光技术》2013,37(1):48-51
为了优化全球移动通信系统中低信噪比环境下的同步算法,采用高斯滤波最小移频键控调制信号的改进同步算法,得到了信号同步成功率对比图.结果表明,在接收端对高斯滤波最小移频键控调制信号先进行相位反旋转,再对其进行符号化,最后应用滑动相关同步过程的同步算法,比传统基于训练序列的滑动相关同步算法成功率高,不但可以大幅提高低信噪比情况下同步成功率,而且简化了门限计算过程.这一结果对信噪比环境下的信号调制具有重要的意义.  相似文献   

13.
A decoding algorithm for algebraic-geometric codes arising from arbitrary algebraic curves is presented. This algorithm corrects any number of errors up to [(d-g-1)/2], where d is the designed distance of the code and g is the genus of the curve. The complexity of decoding equals σ(n3) where n is the length of the code. Also presented is a modification of this algorithm, which in the case of elliptic and hyperelliptic curves is able to correct [(d-1)/2] errors. It is shown that for some codes based on plane curves the modified decoding algorithm corrects approximately d/2-g/4 errors. Asymptotically good q-ary codes with a polynomial construction and a polynomial decoding algorithm (for q⩾361 on some segment their parameters are better than the Gilbert-Varshamov bound) are obtained. A family of asymptotically good binary codes with polynomial construction and polynomial decoding is also obtained, whose parameters are better than the Blokh-Zyablov bound on the whole interval 0<σ<1/2  相似文献   

14.
Sipser and Spielman (see ibid., vol.42, p.1717-22, Nov. 1996) have introduced a constructive family of asymptotically good linear error-correcting codes-expander codes-together with a simple parallel algorithm that will always remove a constant fraction of errors. We introduce a variation on their decoding algorithm that, with no extra cost in complexity, provably corrects up to 12 times more errors  相似文献   

15.
Several results on binary (d, k) codes are given. First, a novel derivation for the capacity of these codes based on information-theoretic principles is given. Based on this result the spectrum of a (d, k) code is computed. Finally, the problem of computing the capacity of the binary symmetric channel under the condition that the input sequences satisfy the (d, k ) constraint is considered. Lower bounds on the capacity of such a channel are derived  相似文献   

16.
On Diamond codes     
A Diamond code is an error-correcting code obtained from two component codes. As in a product code, any symbol in a word of a Diamond code is checked by both component codes. However, the “code directions” for the component codes have been selected to minimize the memory that is required between successive decoding stages for the component codes. Diamond codes combine the error correcting power of a product code with the reduced memory requirements of the cross interleaved Reed-Solomon code (CIRC), applied in the compact disk system. We discuss encoding, decoding, and minimum distance properties of Diamond codes. Variations on the Diamond code construction are proposed that result in codes that are suited for use in rewritable block-oriented applications  相似文献   

17.
On the covering radius of codes   总被引:1,自引:0,他引:1  
The covering radiusRof a code is the maximal distance of any vector from the code. This work gives a number of new results concerningt[n, k], the minimal covering radius of any binary code of lengthnand dimensionk. For examplet[n, 4]andt[n, 5]are determined exactly, and reasonably tight bounds ont[n, k]are obtained for anykwhennis large. These results are found by using several new constructions for codes with small covering radius. One construction, the amalgamated direct sum, involves a quantity called the norm of a code. Codes with normleq 2 R + 1are called normal, and may be combined efficiently. The paper concludes with a table giving bounds ont[n, k]forn leq 64.  相似文献   

18.
We show that the generator matrix of a generalized concatenated code (GCC code) of order L consists of L submatrices, where the lth submatrix is the Kronecker product of the generator matrices of the lth inner code and the lth outer code. In a similar way we show that the parity-check matrix of a generalized error location code (GEL code) of order L consists of L submatrices, where the lth submatrix is the Gronecker product of the parity-check matrices of the lth inner code and the lth outer code. Then we use these defining matrices to show that for any GCC code there exists an equivalent GEL code and vice versa  相似文献   

19.
We explain how to obtain the weight enumerator and the performance of linear block codes formed in several distinct ways from a convolutional code  相似文献   

20.
In a balanced code each codeword contains equally many 1's and 0's. Parallel decoding balanced codes with 2r (or 2r -1) information bits are presented, where r is the number of check bits. The 22-r-1 construction given by D.E. Knuth (ibid., vol.32, no.1, p.51-3, 1986) is improved. The new codes are shown to be optimal when Knuth's complementation method is used  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号