共查询到20条相似文献,搜索用时 62 毫秒
1.
A procedure is described for the design of a dual observer of order (q?1), for a linear system of order n, where q is the controllability index. All (n+q?1) poles of the composite system may be assigned arbitrary values. 相似文献
2.
A simple method is developed for computing elements of order 2kn, where n|2p?1?1 and 2 ? k ? p+1, in the Galois field GF(q2), and q = 2p?1 is a Mersenne prime. Such primitive elements are needed to implement complex number-theoretic transforms. 相似文献
3.
A procedure is described for generating passive lumped nports that interpolate to prescribed n×n `passive? matrices at designated points on the real-frequency j? axis. In those cases where the given matrices are `lossless?, the resulting n ports can be constructed with no more than 2qn reactive elements (q is the number of frequencies), whereas, in the general case, 4qn elements are used. 相似文献
4.
A combinational logicfree F.S.R. construction is specified which allows the high speed generation of m-sequences. These constructions are based on characteristic polynomials of the form (1 ? x)q ? xp and they can be designed so as to produce sequences based on primitive trinomial recurrences of the form xn = xn?q ? xn?p at a rate q times as fast as the basic shift pulse rate. 相似文献
5.
Vu V. Wu L. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2005,51(9):3200-3208
Given positive integers q,n, and d, denote by A/sub q/(n,d) the maximum size of a q-ary code of length n and minimum distance d. The famous Gilbert-Varshamov bound asserts that A/sub q/(n,d+1)/spl ges/q/sup n//V/sub q/(n,d) where V/sub q/(n,d)=/spl Sigma//sub i=0//sup d/ (/sub i//sup n/)(q-1)/sup i/ is the volume of a q-ary sphere of radius d. Extending a recent work of Jiang and Vardy on binary codes, we show that for any positive constant /spl alpha/ less than (q-1)/q there is a positive constant c such that for d/spl les//spl alpha/n A/sub q/(n,d+1)/spl ges/cq/sup n//V/sub q/(n,d)n. This confirms a conjecture by Jiang and Vardy. 相似文献
6.
A system consists of n-identical parallel subsystems, each having an exponential distribution of times to failure and an exponential distribution of times to repair. The system reliability with repair is the probability of no more than q out of n subsystems being simultaneously in a failed state during time t. Under conditions frequently met in practice, system reliability with repair R(t) can be approximated by: R(t) ? exp [?t/Tm] where Tm is the mean time for the system to pass for the first time from zero to (q + 1) simultaneous subsystem failures. Exact and approximate methods of calculating Tm are developed. A detailed error analysis is presented showing the limitations of using Tm to calculate system reliability with repair. 相似文献
7.
Karpovsky M. Taubin A. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2004,50(8):1818-1819
A code C detects error e with probability 1-Q(e),ifQ(e) is a fraction of codewords y such that y, y+e/spl isin/C. We present a class of optimal nonlinear q-ary systematic (n, q/sup k/)-codes (robust codes) minimizing over all (n, q/sup k/)-codes the maximum of Q(e) for nonzero e. We also show that any linear (n, q/sup k/)-code V with n /spl les/2k can be modified into a nonlinear (n, q/sup k/)-code C/sub v/ with simple encoding and decoding procedures, such that the set E={e|Q(e)=1} of undetected errors for C/sub v/ is a (k-r)-dimensional subspace of V (|E|=q/sup k-r/ instead of q/sup k/ for V). For the remaining q/sup n/-q/sup k-r/ nonzero errors, Q(e)/spl les/q/sup -r/for q/spl ges/3 and Q(e)/spl les/ 2/sup -r+1/ for q=2. 相似文献
8.
It is shown that zero conversion loss may be obtained for the frequency change from ?q to 2?p ± ?q using an ideal ring modulator switched at a frequency ?p and having a reactive idler circuit at the normal output terminals. The frequency 2 ?p ± ?q is obtained at the normal input terminals, so that advantages are obtained with regard to earthing arrangements. 相似文献
9.
The matrix exponential exp(At) may be approximated to in some circumstances by the matrix function ?p,q(At), where ?p,q(u) is a Padé approximant to exp(u). The approximation breaks down if A has large latent roots, and in this case may be replaced by {?p,q(At/r)}r for some integer r. An error analysis of the latter approximation is given. A reply from the original author follows. 相似文献
10.
11.
List decoding of q-ary Reed-Muller codes 总被引:2,自引:0,他引:2
Pellikaan R. Xin-Wen Wu 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2004,50(4):679-682
The q-ary Reed-Muller (RM) codes RM/sub q/(u,m) of length n=q/sup m/ are a generalization of Reed-Solomon (RS) codes, which use polynomials in m variables to encode messages through functional encoding. Using an idea of reducing the multivariate case to the univariate case, randomized list-decoding algorithms for RM codes were given in and . The algorithm in Sudan et al. (1999) is an improvement of the algorithm in , it is applicable to codes RM/sub q/(u,m) with u
相似文献
12.
13.
Constructions and properties of Costas arrays 总被引:12,自引:0,他引:12
《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1984,72(9):1143-1163
A Costas array is an n × n array of dots and blanks with exactly one dot in each row and column, and with distinct vector differences between all pairs of dots. As a frequency-hop pattern for radar or sonar, a Costas array has an optimum ambiguity function, since any translation of the array parallel to the coordinate axes produces at most one out-of-phase coincidence. We conjecture that n × n Costas arrays exist for every positive integer n. Using various constructions due to L. Welch, A. Lempel, and the authors, Costas arrays are shown to exist when n = p - 1, n = q - 2, n = q - 3, and sometimes when n = q - 4 and n = q - 5, where p is a prime number, and q is any power of a prime number. All known Costas array constructions are listed for 271 values of n up to 360. The first eight gaps in this table occur at n = 32, 33, 43, 48, 49, 53, 54, 63. (The examples for n = 19 and n = 31 were obtained by augmenting Welch's construction.) Let C(n) denote the total number of n × n Costas arrays. Costas calculated C(n) for n ≤ 12. Recently, John Robbins found C(13) = 12828. We exhibit all the arrays for n ≤ 8. From Welch's construction, C(n) ≥ 2n for infinitely many n. Some Costas arrays can be sheared into "honeycomb arrays." All known honeycomb arrays are exhibited, corresponding to n = 1, 3, 7, 9, 15, 21, 27, 45. Ten unsolved problems are listed. 相似文献
14.
Given the rational algebraic function X(s) = an?1Sn?1+an?2Sn?2+?+a1s+a0/sn+bn?1sn?1+?+b1s+b0 it is shown that the corresponding time function is expressed simply by the linear combination x(t) = an?1qn?1(t)+an?2qn?2(t) +? +a1q1(t) + a0q0(t) where functions qt(t) are the last column elements of the transition matrix M(t) = exp (At). 相似文献
15.
Poli A. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1995,41(3):790-794
A simple deterministic algorithm to construct a normal basis of GF(qn) over GF(q) (q=pr, p prime) is given. When p=2, the authors deduce a (self complementary normal-SCN) basis of GF(q n) over GF(q) for n odd, or n=2t, t odd. In characteristic 2 these cases are known to be the only possible ones for which there exists an SCN basis 相似文献
16.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1986,32(3):349-354
An(n, k, d) linear code overF= GF(q) is said to be {em maximum distance separable} (MDS) ifd = n - k + 1 . It is shown that an(n, k, n - k + 1) generalized Reed-Solomon code such that2leq k leq n - lfloor (q - 1)/2 rfloor (k neq 3 {rm if} q is even) can be extended by one digit while preserving the MDS property if and only if the resulting extended code is also a generalized Reed-Solomon code. It follows that a generalized Reed-Solomon code withk in the above range can be {em uniquely} extended to a maximal MDS code of lengthq + 1 , and that generalized Reed-Solomon codes of lengthq + 1 and dimension2leq k leq lfloor q/2 rfloor + 2 (k neq 3 {rm if} q is even) do not have MDS extensions. Hence, in cases where the(q + 1, k) MDS code is essentially unique,(n, k) MDS codes withn > q + 1 do not exist. 相似文献
17.
(p+q)端口回转器及其群特性 总被引:7,自引:0,他引:7
本文提出了一类多端口电阻元件-(p+q)端合回转器,用群论的方法研究了所有(p+q)端口回转器与变压器构成的集合GIT(p+q)。结果表明,当p=q=n时,GIT(2n)构民群,同时还讨论了(p+q)端口回转器的分解,电路实现方法和应用。 相似文献
18.
19.
Ashikhmin A. Litsyn S. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2004,50(8):1812-1818
A maximum a posteriori (MAP) probability decoder of a block code minimizes the probability of error for each transmitted symbol separately. The standard way of implementing MAP decoding of a linear code is the Bahl-Cocke-Jelinek-Raviv (BCJR) algorithm, which is based on a trellis representation of the code. The complexity of the BCJR algorithm for the first-order Reed-Muller (RM-1) codes and Hamming codes is proportional to n/sup 2/, where n is the code's length. In this correspondence, we present new MAP decoding algorithms for binary and nonbinary RM-1 and Hamming codes. The proposed algorithms have complexities proportional to q/sup 2/n log/sub q/n, where q is the alphabet size. In particular, for the binary codes this yields complexity of order n log n. 相似文献