Results 21 to 30 of about 183,434 (340)
The recently proposed recursive convolutional lattice code (RCLC) can form a signal with pseudo-Gaussian constellations, and their parallel concatenation is shown to approach the Shannon limit.
Toshiki Matsumine, Hideki Ochiai
doaj +1 more source
Constructions of Quantum Convolutional Codes [PDF]
We address the problems of constructing quantum convolutional codes (QCCs) and of encoding them. The first construction is a CSS-type construction which allows us to find QCCs of rate 2/4.
Grassl, Markus, Roetteler, Martin
core +3 more sources
Accurate Performance Analysis of Coded Large-Scale Multiuser MIMO Systems with MMSE Receivers
In this paper, we estimate the uplink performance of large-scale multi-user multiple-input multiple-output (MIMO) networks. By applying minimum-mean-square-error (MMSE) detection, a novel statistical distribution of the signal-to-interference-plus-noise ...
Kai Zhai, Zheng Ma, Xianfu Lei
doaj +1 more source
Exit chart analysis of parallel data convolutional codes [PDF]
We recently proposed a new class of turbo-like codes called parallel data convolutional codes (PDCCs). The distinct characteristics of PDCCs include parallel data input bits and a self-iterative soft-in/soft-out a posteriori probability(APP) decoder. In
Leis, John +2 more
core +1 more source
Examples of minimal-memory, non-catastrophic quantum convolutional encoders [PDF]
One of the most important open questions in the theory of quantum convolutional coding is to determine a minimal-memory, non-catastrophic, polynomial-depth convolutional encoder for an arbitrary quantum convolutional code.
Hosseini-Khayat, Saied +2 more
core +4 more sources
Increasing the resistance of a system consisting of several programmable logic integrated circuits (FPGA) to space radiation effects is discussed in the paper.
A. A. Nikitin, Yu. N. Zhigulevtsev
doaj +1 more source
A new approach to software vulnerability detection based on CPG analysis
Detecting source code vulnerabilities is an essential issue today. In this paper, to improve the efficiency of detecting vulnerabilities in software written in C/C++, we propose to use a combination of Deep Graph Convolutional Neural Network (DGCNN) and ...
Cho Do Xuan
doaj +1 more source
The Extended Invariant Factor Algorithm with Application to the Forney Analysis of Convolutional Codes [PDF]
In his celebrated paper on the algebraic structure of convolutional codes, Forney showed that by using the invariant-factor theorem, one can transform an arbitrary polynomial generator matrix for an (n, k) convolutional code C into a basic (and ...
McEliece, Robert J., Onyszchuk, Ivan
core +1 more source
Recently, CRC-aided list decoding of convolutional codes has gained attention thanks to its remarkable performance in the short blocklength regime. This paper studies the convolutional and CRC codes of the Consultative Committee for Space Data System ...
Riccardo Schiavone +2 more
doaj +1 more source
Design of high-speed and low-latency Viterbi decoder
In a Viterbi decoder, there are two known memory organization techniques for the storage of survivor sequences, namely register exchange method and traceback method.
Yang Min
doaj +1 more source

