期刊文献+

A Novel Method for Identifying Recursive Systematic Convolutional Encoders Based on the Cuckoo Search Algorithm

下载PDF
导出
摘要 The existing methods for identifying recursive systematic convolutional encoders with high robustness require to test all the candidate generator matrixes in the search space exhaustively.With the increase of the codeword length and constraint length,the search space expands exponentially,and thus it limits the application of these methods in practice.To overcome the limitation,a novel identification method,which gets rid of exhaustive test,is proposed based on the cuckoo search algorithm by using soft-decision data.Firstly,by using soft-decision data,the probability that a parity check equation holds is derived.Thus,solving the parity check equations is converted to maximize the joint probability that parity check equations hold.Secondly,based on the standard cuckoo search algorithm,the established cost function is optimized.According to the final solution of the optimization problem,the generator matrix of recursive systematic convolutional code is estimated.Compared with the existing methods,our proposed method does not need to search for the generator matrix exhaustively and has high robustness.Additionally,it does not require the prior knowledge of the constraint length and is applicable in any modulation type.
出处 《China Communications》 SCIE CSCD 2022年第12期64-72,共9页 中国通信(英文版)
  • 相关文献

参考文献6

二级参考文献35

  • 1邹艳,陆佩忠.关键方程的新推广[J].计算机学报,2006,29(5):711-718. 被引量:62
  • 2邹艳,陆佩忠,朱雪岭.软判决快速相关攻击新算法与应用[J].计算机研究与发展,2007,44(4):581-588. 被引量:4
  • 3Lu Pei-zhong, Shen Li, Zou Yan, and Luo Xiang-yang. Blind recognition of punctured convolutional codes[J]. Science in China Ser. F Information Sciences, 2005, 48(4): 484-498.
  • 4Begin G and Haccoun D. High-rate punctured convolutional codes: Structure properties and construction techniques [J]. IEEE Transactions on Communicaitons, 1989, 37(11): 1381-1385.
  • 5Wang Feng-hua, Huang Zhi-tao, and Zhou Yi-yu. A method for blind recognition of convolution code based euclidean algorithmiC].// IEEE International Conference on Wireless Communications. Shanghai: IEEE Press, 2007: 1414-1417.
  • 6刘玉君.信道编码(修订版)[M].郑州:河南科学技术出版社,2001..
  • 7Wang Feng-hua,Huang Zhi-tao. A method for blind recognition of convolution code based on euclidean algorithm [ A ]. IEEE International Conference on Wireless Communications Net- working and Mobile Computing [ C] . Shanghai: IEEE Press, 2007. 1414 - 1417.
  • 8刘玉君.信道编码(第三版)[M].郑州:河南科学技术出版社.2006:63-71,215-225.
  • 9J Hagenauer, E Offer, L Papke. Iterative decoding of binary block and convolutional codes [ J ]. IEEE Transacfiom on In- formation Theory, March 1996,42 (2) : 429 - 445.
  • 10Bringer J and Chabanne H. Code reverse engineering problem for identification codes[J]. IEEE Transactions on Information Theory, 2012, 58(4): 2406-2412.

共引文献150

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部