On the Unequal Error Protection Capability of a q-Ary Image 0f a L0W-Rate q^m-Ary Cyclic Code (Special Section on Information Theory and Its Applications)
スポンサーリンク
概要
- 論文の詳細を見る
An algorithm for finding the unequal error protection (UEP) capability of a q-ary image of a low-rate q^m-ary cyclic code is presented by combining its concatenated structure with the UEP capability of concatenated codes. The results are independent of a choice of a basis to be used for expanding an element over GF (q^m.) into GF (q). A table of the UEP capability of binary images of low-rate Reed-Solomon codes over GF (26)is given. It is shown that the encoding and decoding algorithms for superimposed concatenated codes can be applied to a q-ary image as a linear UEP code.
- 社団法人電子情報通信学会の論文
- 1996-09-25
著者
-
SAKAKIBARA Katsumi
Faculty of Computer Science and System Engineering, Okayama Prefectural University
-
Sakakibara Katsumi
The Faculty Of Computer Science & System Engineering Okayama Prefectural University
-
Sakakibara Katsumi
Faculty Of Computer Science & System Engineering Okayama Prefectural University
-
Sakakibara Katsumi
Department Of Obstetrics And Gyleecology Nagoya University School Of Medicine
-
KASAHARA Masao
Faculty of Informatics, Osaka Gakuin University
-
Kasahara Masao
Osaka Gakuin Univ. Suita‐shi Jpn
-
YUBA Yoshiharu
Faculty of Computer Science & System Engineering, Okayama Prefectural University
-
Kasahara Masao
Faculty Of Informatics Osaka Gakuin University
-
Yuba Y
Okayama Prefectural Univ. Soja‐shi Jpn
-
Kasahara Masao
Department of Faculty of Informatics, Osaka Gakuin University
関連論文
- Analysis of Unsaturation Performance of IEEE 802.11 DCF with and without Slow Contention Window Decrease(Communication Theory, Information Theory and Its Applications)
- On the Stability of Slow-Frequency-Hopped Slotted ALOHA Systems with Retransmission Cutoff(Special Section on Information Theory and Its Applications)
- A New Traitor Tracing
- Combinatorial Effects of Timer Control and Backoff Algorithms on Bulk Data Transfer over Two-State Markovian Channels(Fundamental Theories)
- Combinatorial Effects of Timer Control and Backoff Algorithms on Bulk Data Transfer over Two-State Markovian Channels
- A New Product-Sum Type Public Key Cryptosystem Based on Reduced Bases : Special Section on Cryptography and Information Security
- A New Probabilistic ID-Based Non-interactive Key Sharing Scheme(Special Section on Cryptography and Information Security)
- A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness(Public Key Cryptography, Cryptography and Information Security)
- A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme (Asymmetric Cipher) (Cryptography and Information Security)
- An Upper Bound on Frame Error Rate for Generalized Concatenated Convolutional Codes
- A Method for Evaluating Minimum Free Chernov Distance of Trellis-Codes for Discrete Memoryless Channel (Special Section on Information Theory and Its Applications)
- An Upper Bound on Bit Error Rate for Concatenated Convolutional Code
- A Class of Trellis-Codes for Partial Response Channel
- Matched Design Method for Concatenated Trellis-Coded Modulation
- High Rate Binary Coset Code Used for Inner Code
- Multi-Dimensional Block Shaping
- An 8-Dimensional Trellis-Coded 8-PSK with Non-zero Crossing Constraint (Special Section on Information Theory and Its Applications)
- On the Stability of Five Types of Slotted ALOHA Systems with Capture and Multiple Packet Reception (Special Section on Information Theory and Its Applications)
- Performance Comparison of Two Retransmission Control Schemes for Slow-Frequency-Hopped Communication Systems (Special Section on Spread Spectrum Techniques and Applications)
- Performance of Type-I Hybrid Selective-Repeat ARQ with Finite Buffer on Fading Channels (Special Issue on Advances in Satellite Communications toward Multimedia Era)
- New Product-Sum Type Public-Key Cryptosystems with Selectable Encryption Key Based on Chinese Remainder Theorem
- A New Product-Sum Public-Key Cryptosystem Using Message Extension(Special Section on Information Theory and Its Applications)
- Some Optimal and Quasi-Optimal Binary Codes from Cyclic Codes over GF (2^m)
- On the Unequal Error Protection Capability of a q-Ary Image 0f a L0W-Rate q^m-Ary Cyclic Code (Special Section on Information Theory and Its Applications)
- PROGNOSTIC SIGNIFICANCE OF NUCLEAR ANALYSIS IN INVASIVE CARCINOMA OF CERVIX PATIENTS TREATED BY PRIMARY RADIATION
- A New Attacking Method Based on Virtual Linear Transformation
- A Construction of Public-Key Cryptosystem Based on Singular Simultaneous Equations(Public Key Cryptography)(Cryptography and Information Security)
- On Optimal and Proper Binary Codes from Irreducible Cyclic Codes over GF(2^m) (Special Section on Information Theory and Its Applications)
- A Construction of Public-Key Cryptosystem Based on Algebraic Coding and Random Coding
- An ID-based key sharing scheme based on discrete logarithm problem over a product of three primes