共查询到20条相似文献,搜索用时 78 毫秒
1.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1974,20(3):325-332
For memoryless discrete-time sources and bounded single-letter distortion measures, we derive a bound on the average per-letter distortion achievable by a trellis source code of fixed constraint length. For any fixed code rate greater thanR(D^{ast}) , the rate-distortion function atD^{ast} , this bound decreases towardD^{ast} exponentially with constraint length. 相似文献
2.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1972,18(4):535-539
It is shown that the numberM of binary-valuedn -tuples having fractional weightdelta or less,0 < delta leq frac{1}{3} , such that no twon -tuples agree in anyL consecutive positions, is bounded by2^{2LH(delta)+1} . A set ofn -tuples is constructed to show that this bound is not likely to be improved upon by any significant factor. This bound is used to show that the ratiod_{DD}/n_{DD} of definite-decoding minimum distance to definite-decoding constraint length is lower bounded byH^{-l}[frac{1}{6} cdot (1 - R)/ (1+R)] asn_{DD} grows without bound. 相似文献
3.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1967,13(3):356-359
The purpose of this paper is to show that decoding complexity need not grow exponentially with the code block length at rates close to channel capacity and also to show the expediency of the approach of imbedding codes in each other. It is demonstrated that it is possible to communicate over a memoryless channel of capacityC at any rateR < C with a probability of error of less than2^{-E(R)nu}, E(R) > 0 , per block of a length approximately proportional tonu^{2} and with a computational decoding complexity per digit which is asymptotically proportional tonu^{alpha} whennu is large,nu^{alpha} being finite forR < C .(alpha rightarrow mbox{as} R rightarrow C, alpha rightarrow 2 mbox{as} R rightarrow 0) . 相似文献
4.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1963,9(3):143-156
A definition of a recurrent code is given in a framework which renders it amenable to mathematical analysis. Recurrent codes for both independent and burst errors are considered, and a necessary and sufficient condition for either type of error correction is established. For burst-error-correcting codes, the problem treated is (for a fixed burst length and redundancy) the minimization of the error-free distance ("guard space") required between bursts. A lower bound is obtained on the guard space, and in certain cases, codes which realize this bound are given. A general code which is close to the lower bound in many cases is also given. For independent errors, a code which will correct any error, provided that no consecutive "n " positions have more than "e " digits in error, is discussed. Fore = 1 , a necessary and sufficient condition onn is derived; fore > 1 , a lower bound onn is obtained, and for the case of redundancy1/2 , an upper bound onn is also derived. 相似文献
5.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1968,14(3):487-490
A linear code of block length n possessing minimum weight d has one code word of weight zero, and no other code words of weight less thand . The weight distribution of the code is given by the set of allW(j), d leq j leq n , describing the number of code words having a weight of exactlyj . Exact weight distributions are known for only a handful of linear codes. This paper presents an explicit upper bound uponW(j) as a function ofn, d , andj . The bound has general applicability to all linear codes. 相似文献
6.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1986,32(6):760-767
LetC be a code of lengthn and rateR over the alphabetA(Q)={ exp (2pi ir/Q): r=O,1, cdots ,Q-1} , and letd(C) be the minimum Euclidean distance ofC . For largen , the lower and upper bounds are obtained in parametric form on the achievable pairs(R, delta) , wheredelta = d^{2}(C)/n holds. To obtain these bounds, the arguments leading to the Gilbert bound and the Elias bound, respectively, are applied to the alphabetA(Q) . ForQ rightarrow infty , they are shown to be expressible in terms of the modified Bessel function of the first kind. The Elias type bound is compared with the Kabatyanskii-Levenshtein (K-L) bound that holds for less restrictive alphabets. It turns out that our upper bound improves the K-L bound fordelta leq 0.93 . 相似文献
7.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1974,20(1):136-138
IfC_1, C_2 are two codes of the same length, letC_1 neq C_2 = {(alpha + eta,beta + eta, alpha + beta + eta) mid alpha, beta in C_1, eta in C_2} . TakingC_1 andC_2 to be two extended quadratic residue codes of length 32, it is shown thatC_1 neq C_2 is a (96,48,16) self-dual even code with all weights divisible by 4. 相似文献
8.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1982,28(5):794-800
New short constraint length convolutional code constructions are tabulated for ratesR=(n-k)/n, k=1,2, cdots ,n-1 withn=2, 3,cdots ,8 , and for constraint lengthsK=3,4, cdots,8 . These codes have been determined by iterative search based upon a criterion of optimizing the free distance profile. Specifically, these codes maximize the free distanced_{f} while minimizing the number of adversaries in the distance, or weight, spectrum. In several instances we demonstrate the superiority of these codes over previously published code constructions at the same rate and constraint length. These codes are expected to have a number of applications, including combined source-channel coding schemes as well as coding for burst or impulsive noise channels. 相似文献
9.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(2):403-405
We discuss[2(p + 1), p + 1] double circulant codes which are the ternary images of the[p + 1,(p + 1)/2] extended quadratic residue codes over GF(9) . Herep is a prime of the formp = 12k pm 5 . As a special result we obtain a[64, 32,18] ternary self-dual code which is the largest known code meeting the bound of Mallows and Sloane. 相似文献
10.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1979,25(5):584-591
The long standing conjecture is established that, for a discrete memoryless channel, there exists a linear convolutional code with infinite constraint length such that therho th(rho geq 1) moment of the number ofF -hypotheses in the Fano sequential decoding algorithm is bounded, provided that the transmission rateR is less thanE_{0}( rho,r)/ rho , wherer(x) is a distribution over the channel input alphabet. A new concept of independence for a finite set of message sequences plays an essential role in averaging a product of likelihood ratios over an ensemble of code sequences in a code tree. A simpler version of the method can be applied to the proof of the conjecture for general tree codes. 相似文献
11.
12.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1981,27(6):788-791
A Mock code for the noiseless multiple access OR channel is introduced. An exponential error bound is proven if the sum of the equal code rates of the asynchronousT users is less thanln 2 . 相似文献
13.
Some long cyclic linear binary codes are not so bad 总被引:1,自引:0,他引:1
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1974,20(3):351-356
We show that when an inner linear cyclic binary code which has an irreducible check polynomial is concatenated with an appropriately chosen maximal-distance-separable outer code, then the overall code is cyclic OverGF(2) . Using this theorem, we construct a number of linear cyclic binary codes which are better than any previously known. In particular, by taking the inner code to be a quadratic residue code, we obtain linear cyclic binary codes of lengthN , rateR , and distanceD geq (1 - 2R)N/ sqrt{2 log N} , which compares favorably with the BCH distanceD sim (2 ln R^{-1})N/log N , although it still fails to achieve the linear growth of distance with block length which is possible with noncyclic linear concatenated codes. While this construction yields many codes, including several with block lengths greater than10^{10^5} , we have not been able to prove that there are arbitrarily long codes of this type without invoking the Riemann hypothesis or the revised Artin conjecture, as the existence of long codes of our type is equivalent to the existence of large primesp for which the index of 2 is(p - 1)/2 . 相似文献
14.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》2007,53(12):4537-4555
15.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(2):385-388
LetV be an(n, k, d) binary projective geometry code withn = (q^{m}-1)/(q - 1), q = 2^{s} , andd geq [(q^{m-r}-1)/(q - 1)] + 1 . This code isr -step majority-logic decodable. With reference to the GF(q^{m}) = {0, 1, alpha , alpha^{2} , cdots , alpha^{n(q-1)-1} } , the generator polynomialg(X) , ofV , hasalpha^{nu} as a root if and only ifnu has the formnu = i(q - 1) andmax_{0 leq l < s} W_{q}(2^{l} nu) leq (m - r - 1)(q - 1) , whereW_{q}(x) indicates the weight of the radix-q representation of the numberx . LetS be the set of nonzero numbersnu , such thatalpha^{nu} is a root ofg(X) . LetC_{1}, C_{2}, cdots, C_{nu} be the cyclotomic cosets such thatS is the union of these cosets. It is clear that the process of findingg(X) becomes simpler if we can find a representative from eachC_{i} , since we can then refer to a table, of irreducible factors, as given by, say, Peterson and Weldon. In this correspondence it was determined that the coset representatives for the cases ofm-r = 2 , withs = 2, 3 , andm-r=3 , withs=2 . 相似文献
16.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(2):395-403
For any(n, k, d) binary linear code, the Griesmer bound says thatn geq sum_{i=0}^{k-1} lceil d/2^{i} rceil , wherelceil x rceil denotes the smallest integergeq x . We consider codes meeting the Griesmer bound with equality. These codes have parametersleft( s(2^{k} - 1) - sum_{i=1}^{p} (2^{u_{i}} - 1), k, s2^{k-1} - sum_{i=1}^{p} 2^{u_{i} -1} right) , wherek > u_{1} > cdots > u_{p} geq 1 . We characterize all such codes whenp = 2 oru_{i-1}-u_{i} geq 2 for2 leq i leq p . 相似文献
17.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1969,15(1):106-109
It is shown that every linear cyclicb -burst-error-correcting code over any finite field can be modified to correct up to(b-2) symbols of synchronization slippage without additional redundancy, while maintaining its additive error-correcting capability in the absence of synchronization errors. For codes that are interleaved to a degreem , the synchronization error-correcting capability ism (b-1) - 1 symbols, whereb geq 3 is the length of the burst each subcode corrects. This technique gives an optimum burst-error-correcting code a synchronization error-corecfing capability that is only one symbol short of the known upper bound and is hence asymptotically optimal. Moreover, the implementation is very simple. 相似文献
18.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1976,22(3):357-359
For a given finite set of messages and their assigned probabilities, Huffman's procedure gives a method of computing a length set (a set of codeword lengths) that is optimal in the sense that the average word length is minimized. Corresponding to a particular length set, however, there may be more than one code. LetL(n) consist of all length sets with largest termn , and, for anyell in L(n) , let{cal S}( ell) be the smallest number of states in any finite-state acceptor which accepts a set of codewords with length setell . It is shown that, for alln > 1 ,n^{2}/(16 log_{2} n) leq max {cal S}(ell) leq 0(n^{2}). ell in L(n) 相似文献
19.
Duadic Codes 总被引:3,自引:0,他引:3
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(5):709-714
A new family of binary cyclic(n,(n + 1)/2) and(n,(n - 1)/2) codes are introduced, which include quadratic residue (QR) codes whenn is prime. These codes are defined in terms of their idempotent generators, and they exist for all oddn = p_{1}^{a_{1}} p_{2}^{a_{2}} cdots p_{r}^{a_{r}} where eachp_{i} is a primeequiv pm 1 pmod{8} . Dual codes are identified. The minimum odd weight of a duadic(n,(n + 1)/2) code satisfies a square root bound. When equality holds in the sharper form of this bound, vectors of minimum weight hold a projective plane. The unique projective plane of order 8 is held by the minimum weight vectors in two inequivalent(73,37,9) duadic codes. All duadic codes of length less than127 are identified, and the minimum weights of their extensions are given. One of the duadic codes of length113 has greater minimum weight than the QR code of that length. 相似文献
20.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1972,18(3):409-414
The weight enumerator of a code is the polynomial begin{equation} W(x,y)= sum_{r=0}^n A_r x^{n-r} y^r, end{equation} wheren denotes the block length andA_r , denotes the number of codewords of weightr . LetC be a self-dual code overGF(q) in which every weight is divisible byc . Then Gleason's theorem states that 1) ifq = 2 andc = 2, the weight enumerator ofC is a sum of products of the polynomialsx^2 + y^2 andx^2y^2 (x^2 - y^2 )^2 ifq = 2 andc = 4, the weight enumerator is a sum of products ofx^8 + 14x^4 y^4 + y^8 andx^4 y^4 (x^4 - y^4)^4 ; and 3) ifq = 3 andc = 3, the weight enumerator is a sum of products ofx^4 + 8xy^3 andy^3(x^3 - y^3)^3 . In this paper we give several proofs of Gleason's theorem. 相似文献