REPORTS IN INFORMATICS ISSN 0333-3590 A Construction for Binary Sequence Sets with Low Peak-to-Average Power Ratio
نویسندگان
چکیده
A recursive construction is provided for sequence sets which possess good Hamming Distance and low Peak-to-Average Power Ratio (PAR) with respect to any Local Unitary Unimodular Transform (including all one and multi-dimensional Discrete Fourier Transforms).
منابع مشابه
Reports in Informatics Issn 0333-3590 Lex M versus Mcs-m Lex M versus Mcs-m
We study the problem of minimal triangulation of graphs. One of the first algorithms to solve this problem is Lex M, which was presented in 1976. A new algorithm, and a simplification of Lex M, called MCS-M was presented in 2002. In this paper we compare these two algorithms and show that they produce the same set of chordal graphs, answering an open question mentioned by the authors of MCS-M.
متن کاملA Construction for Binary Sequence Sets with Low Peak-to-Average Power Ratio
A recursive construction is provided for sequence sets which possess good Hamming Distance and low Peak-to-Average Power Ratio (PAR) under any Local Unitary Unimodular Transform (including all one and multi-dimensional Discrete Fourier Transforms). An important instance of the construction identifies an iteration and specialisation of the Maiorana-McFarland (MM) construction.
متن کاملISSN 0333-3590 Iterative decoding for the asymmetric channel
We discuss several aspects of coding for the asymmetric channel, with emphasis on iterative coding. We implement turboand LDPC decoders for the Z-channel, and a novel coding scheme designed to approach the optimum input distribution for the channel. Index terms Z-channel, iterative decoding, channel capacity.
متن کاملREPORTS IN INFORMATICS ISSN 0333-3590 Binary Collusion-Secure Codes: Comparison and Improvements
With a digital fingerprinting scheme a vendor of digital copies of copyrighted material marks each individual copy with a unique fingerprint. If an illegal copy appears, it can be traced back to one or more guilty pirates, due to this fingerprint. To work against a coalition of several pirates the fingerprinting scheme must be based on a collusion-secure code. Quite a few collusion-secure codes...
متن کاملREPORTS IN INFORMATICS ISSN 0333-3590 Analysis and Computational Study of Flow-based Formulations for Minimum-Energy Multicasting in Wireless Ad Hoc Networks
Multicast sessions in wireless ad hoc networks require messages to be routed from a source node to a set of recipient nodes. Message forwarding from any intermediate node in the route is a power-consuming operation, and since batteries are the only available energy source, this resource is scarce. In this paper we present and analyze integer programming models for routing multicast or broadcast...
متن کامل