期刊文献+
共找到1,049篇文章
< 1 2 53 >
每页显示 20 50 100
SIMULATED-ANNEALING-BASED SELECTION OF BINARY CODES
1
作者 李炳成 《Journal of Electronics(China)》 1991年第4期317-323,共7页
Binary code signals have been widely used in various radars due to their simpleimplementation,but the selection of the binary codes with high comporession ratio and lowsidelobes is not solved well,because of the diffi... Binary code signals have been widely used in various radars due to their simpleimplementation,but the selection of the binary codes with high comporession ratio and lowsidelobes is not solved well,because of the difficult processing in mathmatics and expensivecalculation cost.In this paper,neural computing is introduced into the field of the selection ofbinary codes and a new method based’on simulated annealing(SA)is proposed.The experimentsshow that the proposed method is able to select the optimal binary codes with much less timecost than the known methods,furhtermore the optimization selection of the binary codes versusthe calculation cost tradeoff is easier. 展开更多
关键词 binary codes Selecting codes SIDELOBES SIMULATED annealing(SA)
在线阅读 下载PDF
Fast approximate matching of binary codes with distinctive bits 被引量:3
2
作者 Chenggang Clarence YAN Hongtao XIE +3 位作者 Bing ZHANG Yanping MA Qiong DAI Yizhi LIU 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第5期741-750,共10页
Although the distance between binary codes can be computed fast in Hamming space, linear search is not practical for large scale datasets. Therefore attention has been paid to the efficiency of performing approximate ... Although the distance between binary codes can be computed fast in Hamming space, linear search is not practical for large scale datasets. Therefore attention has been paid to the efficiency of performing approximate nearest neighbor search, in which hierarchical clustering trees (HCT) are widely used. However, HCT select cluster centers randomly and build indexes with the entire binary code, this degrades search performance. In this paper, we first propose a new clustering algorithm, which chooses cluster centers on the basis of relative distances and uses a more homogeneous partition of the dataset than HCT has to build the hierarchical clustering trees. Then, we present an algorithm to compress binary codes by extracting distinctive bits according to the standard deviation of each bit. Consequently, a new index is proposed using compressed binary codes based on hierarchical decomposition of binary spaces. Experiments conducted on reference datasets and a dataset of one billion binary codes demonstrate the effectiveness and efficiency of our method. 展开更多
关键词 binary codes approximate nearest neighbor search hierarchical clustering index
原文传递
Research of Methods for Lost Data Reconstruction in Erasure Codes over Binary Fields 被引量:2
3
作者 Dan Tang 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第1期43-48,共6页
In the process of encoding and decoding,erasure codes over binary fields,which just need AND operations and XOR operations and therefore have a high computational efficiency,are widely used in various fields of inform... In the process of encoding and decoding,erasure codes over binary fields,which just need AND operations and XOR operations and therefore have a high computational efficiency,are widely used in various fields of information technology.A matrix decoding method is proposed in this paper.The method is a universal data reconstruction scheme for erasure codes over binary fields.Besides a pre-judgment that whether errors can be recovered,the method can rebuild sectors of loss data on a fault-tolerant storage system constructed by erasure codes for disk errors.Data reconstruction process of the new method has simple and clear steps,so it is beneficial for implementation of computer codes.And more,it can be applied to other non-binary fields easily,so it is expected that the method has an extensive application in the future. 展开更多
关键词 binary fields data reconstruction decoding erasure codes
在线阅读 下载PDF
Optimal binary codes and binary construction of quantum codes
4
作者 Weiliang WANG Yangyu FAN Ruihu LI 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第6期1024-1030,1031,共8页
This paper discusses optimal binary codes and pure binary quantum codes created using Steane construction. First, a local search algorithm for a special subclass of quasi-cyclic codes is proposed, then five binary qua... This paper discusses optimal binary codes and pure binary quantum codes created using Steane construction. First, a local search algorithm for a special subclass of quasi-cyclic codes is proposed, then five binary quasi-cyclic codes are built. Second, three classical construction methods are generalized for new codes from old such that they are suitable for constructing binary self-orthogonal codes, and 62 binary codes and six subcode chains of obtained self-orthogonal codes are designed. Third, six pure binary quantum codes are constructed from the code pairs obtained through Steane construction. There are 66 good binary codes that include 12 optimal linear codes, 45 known optimal linear codes, and nine known optimal self-orthogonal codes. The six pure binary quantum codes all achieve the performance of their additive counterparts constructed by quaternary construction and thus are known optimal codes. 展开更多
关键词 binary linear code binary self-orthogonal code quasi-cyclic code Steane construction quantum code.
原文传递
THE NEW METHOD OF GENERATION OF BINARY TREES FROM ZER0(0) AND ONE(1) CODES
5
作者 蔡恒 《Journal of China Textile University(English Edition)》 EI CAS 1995年第2期94-99,共6页
A binary tree can be represented by a code reflecting the traversal of the corresponding regular binary tree in given monotonic order. A different coding scheme based on the branches of a regular binary tree with n-no... A binary tree can be represented by a code reflecting the traversal of the corresponding regular binary tree in given monotonic order. A different coding scheme based on the branches of a regular binary tree with n-nodes is proposed. It differs from the coding scheme generally used and makes no distinction between internal nodes and terminal nodes. A code of a regular binary tree with nnodes is formed by labeling the left branches by O’s and the right branches by l’s and then traversing these branches in pre-order. Root is always assumed to be on a left branch. 展开更多
关键词 code TRAVERSAL MONOTONIC order binary TREE RECURSION backtrack approach algorithm design.
在线阅读 下载PDF
Binary Cyclic Codes and Minimal Codewords
6
作者 Selda Calkavur 《Computer Technology and Application》 2013年第9期486-489,共4页
Cyclic codes form an important class of codes. They have very interesting algebraic structure. Furthermore, they are equivalent to many important codes, such as binary Hamming codes, Golay codes and BCH codes. Minimal... Cyclic codes form an important class of codes. They have very interesting algebraic structure. Furthermore, they are equivalent to many important codes, such as binary Hamming codes, Golay codes and BCH codes. Minimal codewords in linear codes are widely used in constructing decoding algorithms and studying linear secret sharing scheme. In this paper, we show that in the binary cyclic code all of the codewords are minimal, except 0 and 1. Then, we obtain a result about the number of minimal codewords in the binary cyclic codes. 展开更多
关键词 Linear code cyclic code binary cyclic code generator polynomial minimal codeword secret sharing.
在线阅读 下载PDF
Binary Code Similarity Detection:Retrospective Review and Future Directions
7
作者 Shengjia Chang Baojiang Cui Shaocong Feng 《Computers, Materials & Continua》 2025年第12期4345-4374,共30页
Binary Code Similarity Detection(BCSD)is vital for vulnerability discovery,malware detection,and software security,especially when source code is unavailable.Yet,it faces challenges from semantic loss,recompilation va... Binary Code Similarity Detection(BCSD)is vital for vulnerability discovery,malware detection,and software security,especially when source code is unavailable.Yet,it faces challenges from semantic loss,recompilation variations,and obfuscation.Recent advances in artificial intelligence—particularly natural language processing(NLP),graph representation learning(GRL),and large language models(LLMs)—have markedly improved accuracy,enabling better recognition of code variants and deeper semantic understanding.This paper presents a comprehensive review of 82 studies published between 1975 and 2025,systematically tracing the historical evolution of BCSD and analyzing the progressive incorporation of artificial intelligence(AI)techniques.Particular emphasis is placed on the role of LLMs,which have recently emerged as transformative tools in advancing semantic representation and enhancing detection performance.The review is organized around five central research questions:(1)the chronological development and milestones of BCSD;(2)the construction of AI-driven technical roadmaps that chart methodological transitions;(3)the design and implementation of general analytical workflows for binary code analysis;(4)the applicability,strengths,and limitations of LLMs in capturing semantic and structural features of binary code;and(5)the persistent challenges and promising directions for future investigation.By synthesizing insights across these dimensions,the study demonstrates how LLMs reshape the landscape of binary code analysis,offering unprecedented opportunities to improve accuracy,scalability,and adaptability in real-world scenarios.This review not only bridges a critical gap in the existing literature but also provides a forward-looking perspective,serving as a valuable reference for researchers and practitioners aiming to advance AI-powered BCSD methodologies and applications. 展开更多
关键词 binary code similarity detection semantic code representation graph-based modeling representation learning large language models
在线阅读 下载PDF
A Novel Decoding Method for Non-Binary TCM Codes
8
作者 Riyadh A. Al-Hilali Abdulkareem S. Abdallah Raad H. Thaher 《Communications and Network》 2014年第1期22-28,共7页
A new non-binary decoding method, which is called Yaletharatalhussein decoding algorithm, is designed and implemented for decoding non-binary convolutional codes which is based on the trellis diagram representing the ... A new non-binary decoding method, which is called Yaletharatalhussein decoding algorithm, is designed and implemented for decoding non-binary convolutional codes which is based on the trellis diagram representing the convolutional encoder. Yaletharatalhussein decoding algorithm outperforms the Viterbi algorithm and other algorithms in its simplicity, very small computational complexity, decoding reliability for high states TCM codes that suitable for Fourth-Generation (4G), decreasing errors with increasing word length, and easy to implement with real-time applications. The proposed Yaletharatalhussein decoding algorithm deals with non-binary error control coding of the convolutional and TCM codes. Convolutional codes differ from block codes in that a block code takes a fixed message length and encodes it, whereas a convolutional code can encode a continuous stream of data, and a hard-decision decoding can easily be realized using the Yaletharatalhussein algorithm. The idea of non-binary codes has been extended for symbols defined over rings of integers, which outperform binary codes with only a small increase in decoding complexity. The simulation results show that the performance of the nonbinary TCM-based Yaletharatalhussein algorithm outperforms the binary and non-binary decoding methods. 展开更多
关键词 Convolutional codes Coded MODULATION (CM) Trellis Code MODULATION (TCM) Non-binary Error Correcting codes Groups Rings of Integers
在线阅读 下载PDF
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection
9
作者 Ran Wei Hui Shu 《Computers, Materials & Continua》 2026年第1期1372-1394,共23页
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug... Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC. 展开更多
关键词 Assembly instruction relocation adversary attack binary code similarity detection
在线阅读 下载PDF
基于Barker码脉冲压缩技术的钢板多阵元Lamb波电磁超声换能器设计与优化
10
作者 石文泽 李淇鑫 +2 位作者 卢超 胡博 刘远 《电工技术学报》 EI CSCD 北大核心 2024年第8期2371-2387,共17页
为了解决传统Barker码脉冲压缩技术受脉冲功率放大器额定参数(占空比,最大脉冲宽度等)限制而导致的脉冲压缩效果下降、检测速度降低等问题,提出一种基于Barker码脉冲压缩技术的多阵元Lamb波电磁超声换能器(EMAT)。建立了基于tone-burst... 为了解决传统Barker码脉冲压缩技术受脉冲功率放大器额定参数(占空比,最大脉冲宽度等)限制而导致的脉冲压缩效果下降、检测速度降低等问题,提出一种基于Barker码脉冲压缩技术的多阵元Lamb波电磁超声换能器(EMAT)。建立了基于tone-burst信号激励-Barker码脉冲压缩技术的多阵元Lamb波EMAT检测过程的有限元模型,分析了永磁体的配置形式、阵元序列长度、激励信号周期数、曲折线圈匝数等因素对脉冲压缩后的主旁瓣比和主瓣宽度的影响,并进行了实验验证。结果表明:曲折线圈匝数为4和Barker码序列长度为13位的多阵元EMAT在配置3对外置永磁体后,其信噪比(SNR)可提高9.8 dB。综合考虑检测回波的空间分辨率和SNR,多阵元Lamb波EMAT最佳参数为:曲折线圈匝数为10、激励信号周期数为11、Barker序列为13位,并配置3对外置永磁体。 展开更多
关键词 电磁超声换能器 barker码脉冲压缩 多阵元Lamb波EMAT 信噪比 空间分辨率
在线阅读 下载PDF
Codes cross-correlation analysis and data/pilot code pairs optimization for Galileo E1 OS and GPS L1C 被引量:3
11
作者 Yang Zaixiu Huang Zhigang Geng Shengqun 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2013年第3期751-765,共15页
The Galileo E1 open service (OS) and the global positioning system (GPS) L1C are intending to use the multiplexed binary offset carrier (MBOC) modulation in E1/L1 band, including both pilot and data components. ... The Galileo E1 open service (OS) and the global positioning system (GPS) L1C are intending to use the multiplexed binary offset carrier (MBOC) modulation in E1/L1 band, including both pilot and data components. The impact of data and pilot codes cross-correlation on the distortion of the discriminator function (i.e., the S-curve) is investigated, when only the pilot (or data) components of MBOC signals are tracked. It is shown that the modulation schemes and the receiver configuration (e.g., the correlator spacing) strongly affect the S-curve bias. In this paper, two methods are proposed to optimize the data/pilot code pairs of Galileo E1 OS and GPS L1C. The optimization goal is to obtain the minimum average S-curve bias when tracking only the pilot components a the specific correlator spacing. Figures of merit, such as S-curve bias, correlation loss and code tracking variance have been adopted for analyzing and comparing the un-optimized and optimized code pairs. Simulation results show that the optimized data/pilot code pairs could significantly mitigate the intra-channel codes cross-correlation, and then improve the code tracking performance of MBOC signals. 展开更多
关键词 Code cross-correlation Code pair optimization GALILEO Global positioning system Multiplexed binary offset carrier S-curve bias
原文传递
Construction of Regular Rate-Compatible LDPC Convolutional Codes 被引量:2
12
作者 Liwei Mu Chulong Liang +1 位作者 Zhiyong Liu Daru Pan 《China Communications》 SCIE CSCD 2016年第8期97-102,共6页
In this paper, we propose a new method to derive a family of regular rate-compatible low-density parity-check(RC-LDPC) convolutional codes from RC-LDPC block codes. In the RC-LDPC convolutional family, each extended... In this paper, we propose a new method to derive a family of regular rate-compatible low-density parity-check(RC-LDPC) convolutional codes from RC-LDPC block codes. In the RC-LDPC convolutional family, each extended sub-matrix of each extended code is obtained by choosing specified elements from two fixed matrices HE1K and HE1K, which are derived by modifying the extended matrices HE1 and HE2 of a systematic RC-LDPC block code. The proposed method which is based on graph extension simplifies the design, and prevent the defects caused by the puncturing method. It can be used to generate both regular and irregular RC-LDPC convolutional codes. All resulted codes in the family are systematic which simplify the encoder structure and have maximum encoding memories which ensure the property. Simulation results show the family collectively offer a steady improvement in performance with code compatibility over binary-input additive white Gaussian noise channel(BI-AWGNC). 展开更多
关键词 binary-input additive white Gaussian noise channel(BI-AWGNC) extended matrices rate-compatible low-density parity-check(RC-LDPC) convolutional codes
在线阅读 下载PDF
[[2n ,n]] ADDITIVE QUANTUM ERROR CORRECTING CODES
13
作者 Du Yongjun Ma Yuefei 《Journal of Electronics(China)》 2008年第4期519-522,共4页
The self-orthogonal condition is analyzed with respect to symplectic inner product for the binary code that generated by [B1 I B2 B3],where Bi are the binary n ×n matrices,I is an identity matrix.By the use of th... The self-orthogonal condition is analyzed with respect to symplectic inner product for the binary code that generated by [B1 I B2 B3],where Bi are the binary n ×n matrices,I is an identity matrix.By the use of the binary codes that generated by [B1 I B2 B2B1^T],asymptotic good[[2n ,n ]]additive quantum codes are obtained. 展开更多
关键词 Additive quantum codes binary codes Symplectic inner product Asymptotic good codes
在线阅读 下载PDF
A New Description of the Additive Quantum Codes
14
作者 唐黎明 刘焕平 吕学琴 《Northeastern Mathematical Journal》 CSCD 2006年第3期285-290,共6页
A new description of the additive quantum codes is presented and a new way to construct good quantum codes [[n, k, d]] is given by using classical binary codes with specific properties in F2^3n. We show several conseq... A new description of the additive quantum codes is presented and a new way to construct good quantum codes [[n, k, d]] is given by using classical binary codes with specific properties in F2^3n. We show several consequences and examples of good quantum codes by using our new description of the additive quantum codes. 展开更多
关键词 quantum code binary linear code dual code
在线阅读 下载PDF
Construction of New Codes from Given Ones in an Additive Channel
15
作者 Garib Movsisyan 《Journal of Information Security》 2016年第3期165-171,共7页
In the present work, a construction making possible creation of an additive channel  of cardinality s and rank r for arbitrary integers s, r, n (r≤min (n,s-1)), as well as creation of a code  correcting err... In the present work, a construction making possible creation of an additive channel  of cardinality s and rank r for arbitrary integers s, r, n (r≤min (n,s-1)), as well as creation of a code  correcting errors of the channel A is presented. 展开更多
关键词 Additive Channel Golay Code Classical Coding Theory T-Order Neighborhood Correcting Code binary Alphabet CARDINALITY
在线阅读 下载PDF
超声导波轨底裂纹检测的信号增强技术 被引量:1
16
作者 何继平 周永久 +5 位作者 钦佩 张岩 周守镇 王平 周文涛 刘勇 《城市轨道交通研究》 北大核心 2025年第4期260-263,268,共5页
[目的]导波在钢轨中的传播过程中存在抗干扰能力差和信号衰减严重问题,不利于识别轨底裂纹。为提高信噪比,有必要提出一种信号增强技术用于增强导波信号。[方法]在传统超声导波检测基础上,利用Barker码作为伪随机序列码,采用BPSK(二进... [目的]导波在钢轨中的传播过程中存在抗干扰能力差和信号衰减严重问题,不利于识别轨底裂纹。为提高信噪比,有必要提出一种信号增强技术用于增强导波信号。[方法]在传统超声导波检测基础上,利用Barker码作为伪随机序列码,采用BPSK(二进制相位编码)技术将原始激励信号经过编码调制后得到新的激励信号,实现对激励信号的扩频处理,并对采集的接收信号进行解扩。搭建超声导波轨底裂纹检测试验平台,分别对不同尺寸的钢轨轨底人工裂纹进行对比试验,分别在激励信号扩频与非扩频情况下,计算所接收导波信号的衰减系数。[结果及结论]试验结果表明,导波信号使用信号增强技术之后,相较于未经处理的原始导波信号,在传播相同距离时,衰减系数得到了明显降低,超声导波信号将能传播更远距离;相同尺寸人工裂纹所产生的影响更加明显,超声导波对钢轨轨底裂纹的检测灵敏度得到了明显提升。 展开更多
关键词 轨道交通 钢轨裂纹检测 barker 超声导波 信号增强技术
在线阅读 下载PDF
哈希定位技术前沿进展及发展趋势
17
作者 任鹏 刘景宇 张伟波 《实验技术与管理》 北大核心 2025年第6期1-8,共8页
哈希定位是一类新兴的基于哈希算法的视觉定位技术。该技术基于图像视觉特征的二进制哈希码表达,实现景物空间位置的估算,进而达到仅利用视觉信息而不依赖其他信息即可反演得到景物空间位置信息的效果。视觉定位的核心技术为视觉特征匹... 哈希定位是一类新兴的基于哈希算法的视觉定位技术。该技术基于图像视觉特征的二进制哈希码表达,实现景物空间位置的估算,进而达到仅利用视觉信息而不依赖其他信息即可反演得到景物空间位置信息的效果。视觉定位的核心技术为视觉特征匹配,但其在实验中面临特征表达复杂和规模庞大等难题,导致定位效率低等局限。哈希定位技术将图像视觉特征映射为精简的二进制哈希码,通过计算哈希码的汉明距离实现快速匹配,进而达成定位目标,有效克服了视觉定位的低效局限,在快速定位方面取得了突破。该文将综述哈希定位及相关实验技术的前沿进展,探讨哈希定位的发展趋势,以期为哈希定位实验技术的研究和应用提供参考依据。 展开更多
关键词 二进制哈希码 汉明距离 视觉定位
在线阅读 下载PDF
脉冲压缩在超声导波钢轨断裂检测的应用研究 被引量:1
18
作者 许溢航 王平 +1 位作者 杨元 王勇 《电子测量技术》 北大核心 2025年第3期112-117,共6页
为提高超声导波钢轨断裂检测距离与断面定位精度,保证钢轨服役期间安全性。本研究采用Barker码编码方式与凯塞窗函数对激励信号进行调制,扩展激励信号时宽,增强发射信号能量,通过对检测信号进行脉冲压缩处理,提高缺陷信号分辨率。开展... 为提高超声导波钢轨断裂检测距离与断面定位精度,保证钢轨服役期间安全性。本研究采用Barker码编码方式与凯塞窗函数对激励信号进行调制,扩展激励信号时宽,增强发射信号能量,通过对检测信号进行脉冲压缩处理,提高缺陷信号分辨率。开展有限元仿真研究,搭建钢轨三维仿真模型,并模拟钢轨断裂损伤情况。钢轨断裂程度为20%时,采用多周期正弦波信号激励,直达波信号的主波包信号与相邻波包信号峰峰值之比为1.065,而采用Barker13编码信号激励,直达波信号的主波包信号与相邻波包信号峰峰值比提高到2.542。分析不同断裂程度下的缺陷回波信号特征,采用Barker13编码激励信号回波信号强度幅值变化在40 dB以上,经有限元仿真研究可知,编码激励与脉冲压缩技术有效提高检测信号的分辨率与信号幅值。结合线下长距离钢轨检测实验,采用多周期正弦波信号所得到的检测信号,始波与回波信号成分复杂,时间差计算困难,而脉冲压缩技术有效提高检测信号信噪比,改善始波信号与回波信号的信号分辨率,断面定位准确率为99.3%。编码激励和脉冲压缩技术有效提高检测信号的幅值以及检测定位精度,为长距离钢轨断面定位提供技术手段。 展开更多
关键词 钢轨断裂 超声导波检测 巴克码 凯塞窗 脉冲压缩
原文传递
11位Barker码性能研究 被引量:4
19
作者 赵晓群 李炳新 +1 位作者 贾世楼 王仲文 《系统工程与电子技术》 EI CSCD 1997年第6期56-58,61,共4页
本文分析了11位长Barker码在加权相关意义下的性能,指出在二值加权相关意义下旁瓣电平下降了1.58dB,达到-22.41dB;在三值加权相关意义下旁瓣电平下降了3.52dB,达到-24.35dB;为工程应用提供了一种新的脉冲压缩方法。
关键词 相关技术 脉冲压缩 barker 雷达
在线阅读 下载PDF
二值映射相关Barker码研究 被引量:3
20
作者 赵晓群 贾世楼 +1 位作者 王仲文 李炳新 《通信学报》 EI CSCD 北大核心 1998年第9期87-90,共4页
给出了二相序列非周期二值映射相关函数的定义,在该定义的基础上定义了二值映射相关Barker码(简称二值加权Barker码),并指出经典的二相序列的非周期相关函数和Barker码是本文新定义的相关函数和Barker码的... 给出了二相序列非周期二值映射相关函数的定义,在该定义的基础上定义了二值映射相关Barker码(简称二值加权Barker码),并指出经典的二相序列的非周期相关函数和Barker码是本文新定义的相关函数和Barker码的特例。新定义的Barker码比原意义的Barker码多5个码字,而且对原意义下的Barker码经加权处理后,可提高主副峰比(长为7的Barker码提高2.5dB,长为11的Barker码提高1.57dB),计算机搜索结果证明长度大于13、小于31的二值加权Barker码是不存在的。 展开更多
关键词 二相序列 自相关函数 barker 映射相关
在线阅读 下载PDF
上一页 1 2 53 下一页 到第
使用帮助 返回顶部