Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 20 Nov 2024Bibliometrics
research-article
Multiple description source coding with no excess marginal rate

Multiple description source coding concerns situations in which the transmission of the source information is distributed over two data streams at rates R1 and R2, respectively. When both data streams are received, the decoder uses the combined data at ...

research-article
Scheduling nonuniform traffic in a packet switching system with large propagation delay

Transmission algorithms are introduced for use in a single-hop packet switching system with nonuniform traffic and with propagation delay that Is large relative to the packet transmission time. The traffic model allows arbitrary traffic streams subject ...

research-article
Quaternary quadratic residue codes and unimodular lattices

We construct new self-dual and isodual codes over the integers module 4. The binary images of these codes under the Gray map are nonlinear, but formally self-dual. The construction involves Hensel lifting of binary cyclic codes. Quaternary quadratic ...

research-article
The automorphism groups of the generalized quadratic residue codes

We give the full automorphism groups as groups of semiaffine transformations, of the extended generalized quadratic residue codes. We also present a proof of the Gleason-Prange theorem for the extended generalized quadratic residue codes that relies ...

research-article
The q-ary image of a qm-ary cyclic code

For (n, q)=1 V a qm-ary cyclic code of length n and with generator polynomial g(x), we show that there exists a basis for F(qm) over Fq with respect to which the q-ary image of V is cyclic, if and only if: (i) g(x) is over Fq; or (ii) g(x)=g0(x)(x-&...

research-article
Theory and applications of q-ary interleaved sequences

A new class of q-ary sequences, called interleaved sequence, is introduced. Their periods, shift equivalence, linear spans, and autocorrelation functions are derived. The interleaved sequences include a large number of popular sequences, such as ...

research-article
Multilevel diversity coding with distortion

In a Diversity Coding System, an information source is encoded by a number of encoders. There are a number of decoders, each of which can access a certain subset of the encoders. We study a diversity coding problem in which there are two levels of ...

research-article
d-form sequences: families of sequences with low correlation values and large linear spans

Large families of binary sequences with low correlation values and large linear span are critical for spread-spectrum communication systems. The author describes a method for constructing such families from families of homogeneous functions over finite ...

research-article
Bounds on the minimum support weights

The minimum support weight, dr(C), of a linear code C over GF(q) is the minimal size of the support of an r-dimensional subcode of C. A number of bounds on dr(C) are derived, generalizing the Plotkin bound and the Griesmer bound, as well as giving two ...

research-article
On a technique to calculate the exact performance of a convolutional code

A Markovian technique is described to calculate the exact performance of the Viterbi algorithm used as either a channel decoder or a source encoder for a convolutional code. The probability of information bit error and the expected Hamming distortion ...

research-article
New constructions of optimal cyclically permutable constant weight codes

Three new constructions for families of cyclic constant weight codes are presented. All are asymptotically optimum in the sense that in each case, as the length of the sequences within the family approaches infinity, the ratio of family size to the ...

research-article
An upper bound for Weil exponential sums over Galois rings and applications

We present an analog of the well-known Weil-Carlitz-Uchiyama (1948, 1957) upper bound for exponential sums over finite fields for exponential sums over Galois rings. Some examples are given where the bound is tight. The bound has immediate application ...

research-article
The threshold probability of a code

We define and estimate the threshold probability θ of a linear code, using a theorem of Margulis (1974) originally conceived for the study of the probability of disconnecting a graph. We then apply this concept to the study of the erasure and Z-...

research-article
Average profile and limiting distribution for a phrase size in the Lempel-Ziv parsing algorithm

Consider the parsing algorithm developed by Lempel and Ziv (1978) that partitions a sequence of length n into variable phrases (blocks) such that a new block is the shortest substring not seen in the past as a phrase. In practice, the following ...

research-article
Convergence analysis of the sign algorithm for adaptive filtering

We consider the convergence analysis of the sign algorithm for adaptive filtering when the input processes are uncorrelated and Gaussian and a fixed step size μ>0 is used. Exact recursive equations for the covariance matrix of the deviation error ...

research-article
Interference suppression by biased nonlinearities

It is shown that, when the input signal-to-interference ratio (SIR) is small, a biased nonlinearity that has a dead zone below some threshold value can provide a large enhancement in output SIR and signal-to-interference-plus-intermodulation ratio (...

research-article
Balanced nonbinary sequences with good periodic correlation properties obtained from modified Kumar-Moreno sequences

Kumar and Moreno (see ibid., vol.37, no.3, p.603, 1991) presented a new family of nonbinary sequences which has not only good periodic correlation properties but also the largest family size. First, the unbalanced properties for Kumar-Moreno sequences ...

research-article
QPSK block-modulation codes for unequal error protection

Unequal error protection (UEP) codes find applications in broadcast channels, as well as in other digital communication systems, where messages have different degrees of importance. Binary linear UEP (LUEP) codes combined with a Gray mapped QPSK signal ...

research-article
The nonexistence of some five-dimensional quaternary linear codes

Let n4(k, d) be the smallest integer n, such that a quaternary linear [n, k, d; 4]-code exists. It is proved that n4 (5, 20)=30, n4(5, 42)⩾59, n4(5, 45)⩾63, n4(5, 64)⩾88, n4(5, 80)=109, n4(5, 140)⩾189, n4(5, 143)⩾193, n4 (5, 168)⩾...

research-article
Universal redundancy rates for the class of B-processes do not exist

Shows that for any sequence ρ(n)=o(n) and any sequence of prefix codes, there is a B-process of entropy arbitrarily close to the maximum possible entropy for which the expected redundancy is at least as large as ρ(n) for infinitely many n. This ...

research-article
Distributed cell-averaging CFAR detection in dependent sensors

Constant false alarm rate detection is considered in a decentralized, two-sensor context. Cases with observations which are dependent from sensor to sensor are investigated, for which results have been lacking. The in-phase and quadrature components of ...

research-article
Distributed detection of narrowband signals

Distributed signal detection schemes have received significant attention, but most research has focused on cases with independent observations at the different sensors. Cases with dependent narrowband signals, which are of practical interest in ...

research-article
Construction techniques for systematic SEC-DED codes with single byte error detection and partial correction capability for computer memory systems

Three new techniques are proposed for constructing a class of codes that extends the protection provided by previous single error correcting (SEC)-double error detecting (DED)-single byte error detecting (SBD) codes. The proposed codes are systematic ...

research-article
Bounded minimum distance decoding of unit memory codes

We propose an algorithm for bounded minimum distance decoding of (partial) unit memory codes up to half the “designed” extended row distance. It makes use of a reduced trellis with the nodes found by bounded minimum distance decoding of the ...

research-article
Coding with digits of unequal cost

At present, optimal coding for a noiseless digital channel with digits of unequal cost requires solving a large linear programming problem. Much simpler procedures give codes, resembling Shannon's (1948) and Huffman's, that are found close to optimal in ...

research-article
On the asymptotic relative efficiency of distributed detection schemes

The asymptotic relative efficiency (ARE) of two centralized detection schemes has proved useful in large-sample-size and weak-signal performance analysis. In the present paper ARE is applied to some distributed detection cases which use counting fusion ...

research-article
Error bounds for parallel distributed detection under the Neyman-Pearson criterion

The Neyman-Pearson performance of a distributed detection system is considered wherein n independent and identically distributed observations are quantized locally into M-ary messages and transmitted to a fusion center. Under fairly general assumptions, ...

research-article
Min-max signal design for detection subject to linear distortion

Considers the problem of deciding between M signals that are observed through an unknown FIR system (channel). The authors suggest a generalized likelihood ratio test, and develop an upper bound on the detection performance under the worst possible ...

research-article
The multivariate complex normal distribution-a generalization

The multivariate complex normal distribution usually employed in the literature is a special case since certain restrictions have been imposed on the covariances of the real and imaginary parts of its variables. A more general distribution is proposed ...

research-article
On lower bounds for the smallest eigenvalue of a Hermitian positive-definite matrix

Presents an improvement to Demho's (1988) lower bound on the smallest eigenvalue of a Hermitian positive-definite matrix. Unlike Dembo's bound the improved bound is always positive

Comments

Please enable JavaScript to view thecomments powered by Disqus.