首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 640 毫秒
1.
On the Hamming distance properties of group codes   总被引:1,自引:0,他引:1  
Under certain mild conditions, the minimum Hamming distance D of an (N, K, D) group code C over a non-abelian group G is bounded by DN -2K+2 if KN/2, and is equal to 1 if K>N/2. Consequently, there exists no (N, K, N-K+1) group code C over an non-abelian group G if 1<K<N. Moreover, any normal code C with a non-abelian output space has minimum Hamming distance equal to D=1. These results follow from the fact that non-abelian groups have nontrivial commutator subgroups. Finally, if C is an (N, K, D) group code over an abelian group G that is not elementary abelian, then there exists an (N, K, D) group code over a smaller elementary abelian group G'. Thus, a group code over a general group G cannot have better parameters than a conventional linear code over a field of the same size as G  相似文献   

2.
The sphere bound is a trivial lower bound on K(n,R), the minimal cardinality of any binary code of length n and with covering radius R. By simple arguments it is considerably improved, to K(n,1)⩾2 n/n for n even. A table of lower and upper bounds on K(n,R) for n⩽33, R ⩽10 is included  相似文献   

3.
The coding scheme uses a set of n convolutional codes multiplexed into an inner code and a (n,n-1) single-parity-check code serving as the outer code. Each of the inner convolutional codes is decoded independently, with maximum-likelihood decoding being achieved using n parallel implementations of the Viterbi algorithm. The Viterbi decoding is followed by additional outer soft-decision single-parity-check decoding. Considering n=12 and the set of short constraint length K=3, rate 1/2 convolutional codes, it is shown that the performance of the concatenated scheme is comparable to the performance of the constraint length K=7, rate 1/2 convolutional code with standard soft-decision Viterbi decoding. Simulation results are presented for the K=3, rate 1/2 as well as for the punctured K=3, rate 2/3 and rate 3/4 inner convolutional codes. The performance of the proposed concatenated scheme using a set of K=7, rate 1/2 inner convolutional codes is given  相似文献   

4.
The authors prove combinatorial lower bounds for Kq (n,R), the minimal cardinality of any q-ary code of length n and covering radius R. Tables of lower bounds for Kq(n,R) are presented for q=3, 4, 5  相似文献   

5.
For Pt. I see ibid., vol.37, no.5, p.1327-141 (1991). For a linear, time-invariant, discrete-time channel with a given transfer function H(f), and information rate R bits/ T, where T is the symbol interval, an optimal signal set of length K is defined to be a set of 2RK inputs of length K that maximizes the minimum l2 distance between pairs of outputs. The author studies the minimum distance between outputs, or equivalently, the coding gain of optimal signal sets as K→∞. He shows how to estimate the coding gain, relative to single-step detection, of an optimal signal set length K when K is large  相似文献   

6.
The authors consider the propagation characteristics and mode conversion of axisymmetric modes in an imperfect SELFOC fiber with longitudinal gradually varying dielectric constant K=ϵ/ϵ0=K0-K 2(z)r2. An analytic solution which is expressed in terms of generalized Laguerre polynomials is found  相似文献   

7.
G.D. Chen et al. (ibid., vol.IT-32, p.680-94, 1986) presented two new lower bounds for K(n,R), where K(n,R) denotes the minimum cardinality of a binary code of length n and covering radius R. The author shows that a slight modification gives further improvements and some examples are given to confirm the argument. Codes that have a certain partitioning property are considered  相似文献   

8.
For n>0, d⩾0, nd (mod 2), let K(n, d) denote the minimal cardinality of a family V of ±1 vectors of dimension n, such that for any ±1 vector w of dimension n there is a vV such that |v- w|⩽d, where v-w is the usual scalar product of v and w. A generalization of a simple construction due to D.E. Knuth (1986) shows that K(n , d)⩽[n/(d+1)]. A linear algebra proof is given here that this construction is optimal, so that K(n, d)-[n/(d+1)] for all nd (mod 2). This construction and its extensions have applications to communication theory, especially to the construction of signal sets for optical data links  相似文献   

9.
Decoding performance of Reed-Solomon (RS) coded M-ary FSK with noncoherent detection in a frequency-hopping spread spectrum mobile radio channel is theoretically analyzed. Exact formulas and an approximate one for evaluating word error rates (WERs) of error correction and error-and-erasure correction schemes on decoding the RS codes are derived. It is shown that with K symbol erasure and C symbol error detection, RS coded M-ary FSK achieves the equivalent diversity order of (K+1)(C+1)  相似文献   

10.
The dependence of nonlinear gain parameter and K factor on material gain in semiconductor lasers has been investigated theoretically by calculating (dg/dS)s=0, derivative of gain g with respect to photon density S. If spectral hole burning is assumed, the square of the line-shape function appears in dg/dS. This implies that the contributions from high-energy electron-hole pairs are reduced, and that (dg/dS)S=0 takes a finite negative value at transparent point (g=0). The nonlinear gain parameter, therefore, diverges, as the gain approaches zero. The K factor is minimized at a value of material gain, which is estimated to be 4.3 ps-1 for typical InGaAs/InGaAsP quantum well lasers. The confinement factor should be designed to maintain the gain at the optimum value  相似文献   

11.
Nomination sampling is a sampling process in which every observation is the maximum of a random sample from some distribution. If all samples are taken from a single underlying CDF, F, data can be viewed as consisting of pairs (Xi,Ki) where Ki is the size of sample i and, given Ki=ki, Xi is distributed according to CDF Fki. R.A. Boyles and F.J. Samaniego (1986) developed a nonparametric maximum-likelihood estimator of F. In the present work, their approach is extended to obtain estimates of the quantiles of F and to study the limit theory and consistency properties of these estimates. These results generalize the results of T.R. Willemain (1980), who discussed the estimation of the median of F based on nomination samples  相似文献   

12.
The decision problem of testing M hypotheses when the source is Kth-order Markov and there are M (or fewer) training sequences of length N and a single test sequence of length n is considered. K, M, n, N are all given. It is shown what the requirements are on M , n, N to achieve vanishing (exponential) error probabilities and how to determine or bound the exponent. A likelihood ratio test that is allowed to produce a no-match decision is shown to provide asymptotically optimal error probabilities and minimum no-match decisions. As an important serial case, the binary hypotheses problem without rejection is discussed. It is shown that, for this configuration, only one training sequence is needed to achieve an asymptotically optimal test  相似文献   

13.
The authors study the multiwindow spectral analysis method as it applies to the detection of sinusoidal signals. They examine the probability of false alarm PFA. The total P FA (sinusoidal frequency unknown) is shown analytically to be bounded below by the order statistics (minimum) of BM/K independent identically distributed (i.i.d.) beta variates, where M is the length of the data record used in the detection, K the number of windows, and B the width of the frequency band of interest. Simulation results indicate a much larger bound, the minimum of BM i.i.d. beta variates. It is shown that for real signals, the assumptions made in the derivation of the detector break down at frequencies close to zero and to half the sampling frequency  相似文献   

14.
The aggregated-least-busy-alternative (ALBA), a distributed, state-dependent, dynamic routing strategy for circuit-switched loss networks is discussed. The networks considered are symmetric and fully connected. The offered calls form Poisson streams, and routes have at most two links. In ALBA(K), the states of each link are lumped into K (K⩾2) aggregates, and the route of each call is determined by local information on the aggregate states of the links of the alternate routes at the time of the call's arrival. The last aggregate is always the set of states reserved for direct traffic. A fixed-point model for ALBA(K) for general K is presented. The particular case of ALBA in which there is no aggregation is least busy alternative (LBA); ALBA(2) represents the other extreme of aggregation. Simulation and analytic results for LBA are compared. An asymptotic scaling based on the fixed-point models is also discussed. It is shown that there is a dichotomy in network behavior: if the offered traffic is below a threshold, then the network loss probability decreases exponentially with increasing network size, and above the threshold, performance is poor  相似文献   

15.
Nomination sampling is a sampling process in which every observation is the maximum of a random sample from some distribution. If the data are {(Yi, Ki), i =1, . . ., n} where Ki is the size of sample i, and Yi is the maximum of a random sample of size Ki from an unknown Cdf, F; the Bayes estimator of F is derived by discretizing F over a fixed finite partition of the support of F and taking a Dirichlet distribution as the prior for the probabilities of the partitioning intervals. For the flood data of the Nidd River considered by R.A. Boyles and F.J. Samaniego (J. Am. Stat. Assoc., vol.81, p.1039-45, 1986), the plots of the Bayes estimator of F are obtained for several sets of values of the parameters of the Dirichlet distribution  相似文献   

16.
The normality of binary codes is studied. The minimum cardinality of a binary code of length n with covering radius R is denoted by K(n,R). It is assumed that C is an (n,M)R code, that is, a binary code of length n with M codewords and covering radius R. It is shown that if C is an (n,M)1 code, then it is easy to find a normal (n ,M)1 code by changing C in a suitable way, and that all the optimal (n,M)1 codes (i.e. those for which M=K(n,1)) are normal and their every coordinate is acceptable. It is shown that if C is an abnormal (n,M) code, then n⩾9, and an abnormal (9118)1 code which is the smallest abnormal code known at present, is constructed. Lower bounds on the minimum cardinality of a binary abnormal code of length n with covering radius 1 are derived, and it is shown that if an (n,M)1 code is abnormal, then M⩾96  相似文献   

17.
Transconductance as high as 676 mS/mm at 300 K was observed to 0.7×10-μm2 n-channel devices (HIGFETs) made on epilayers with Al0.3Ga0.7As insulator thickness of 200 Å and In0.15Ga0.85As channel thickness of 150 Å. An FET K value (K=Wg Uε/2aLg) as large as 10.6 mA/V 2 was also measured from another device with transconductance of 411 mS/mm. The high K values are achieved under normal FET operation without hole-injection or drain-avalanche breakdown effects. These results demonstrate the promise of pseudomorphic (Al,Ga)As/(In,Ga)As HIGFETs for high-performance circuit applications  相似文献   

18.
The packet error probability induced in a frequency-hopped spread-spectrum packet radio network is computed. The frequency spectrum is divided into q frequency bins. Each packet is exactly one codeword from an (M, L) Reed-Solomon code [M=number of codeword symbols (bytes); L=number of information symbols (bytes)]. Every user in the network sends each of the M bytes of his packet at a frequency chosen among the q frequencies with equal probability and independently of the frequencies chosen for other bytes (i.e., memoryless frequency-hopping patterns). Statistically independent frequency-hopping patterns correspond to different users in the network. Provided that K users have simultaneously transmitted their packets on the channel and a receiver has locked on to one of these K packets, the probability that this packet is not decoded correctly is evaluated. It is also shown that although memoryless frequency-hopping patterns are utilized, the byte errors at the receiver are not statistically independent; instead they exhibit a Markovian structure  相似文献   

19.
Smaller cells for greater performance   总被引:8,自引:0,他引:8  
A microcell architecture that reduces interference, increases system capacity, improves voice quality, and demands fewer handoffs is described. The system is easy to implement and poses a very low risk investment. Its capacity and voice quality are analyzed. Capacity, based on the K=3 system (K is the cell reuse factor), is 2.33 times higher than the existing analog system of K=7. This microcell system can provide better voice quality than the Advanced Mobile Phone Service (AMPS) cellular system at 850 MHz. It can be used with digital cellular with slight modification, and is suitable for in-building communications  相似文献   

20.
One of the Doppler radars operated by the National Severe Storms Laboratory can measure the difference between propagation phase constants KDp at horizontal and vertical polarization. This study examines the use of this parameter K Dp in addition to the reflectivity factor ZH and the differential reflectivity ZDR, to obtain information about rain and hail. It is shown from theory and experiments that a third parameter of the drop size distribution, obtained from KDP, can be used to support Z DR measurement and/or to point out mixed-phase hydrometeors. Quantitative information on hail size distribution can be obtained for small hailstones when their major axes are nearly vertically aligned, giving rise to negative ZDR and KDP values  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号