A construction of UD k-ary multi-user codes from (2^m(k-1)+1)-ary codes for MAAC

01/21/2019
by   Shan Lu, et al.
0

In this paper, we proposed a construction of a UD k-ary T-user coding scheme for MAAC. We first give a construction of k-ary T^f+g-user UD code from a k-ary T^f-user UD code and a k^±-ary T^g-user difference set with its two component sets D^+ and D^- a priori. Based on the k^±-ary T^g-user difference set constructed from a (2k-1)-ary UD code, we recursively construct a UD k-ary T-user codes with code length of 2^m from initial multi-user codes of k-ary, 2(k-1)+1-ary, ..., (2^m(k-1)+1)-ary. Introducing multi-user codes with higer-ary makes the total rate of generated code A higher than that of conventional code.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/19/2021

A construction of maximally recoverable codes

We construct a family of linear maximally recoverable codes with localit...
research
09/25/2019

Multiple-Rate Channel Codes in GF(p^n^2)

A code C(n, k, d) defined over GF(q^n) is conventionally designed to enc...
research
12/17/2015

Unsupervised Feature Construction for Improving Data Representation and Semantics

Feature-based format is the main data representation format used by mach...
research
01/22/2020

Construction of Rate (n-1)/n Non-Binary LDPC Convolutional Codes via Difference Triangle Sets

This paper provides a construction of non-binary LDPC convolutional code...
research
05/01/2022

QC-LDPC Codes from Difference Matrices and Difference Covering Arrays

We give a framework for generalizing LDPC code constructions that use Tr...
research
01/05/2018

Bayesian calibration of a numerical code for prediction

Field experiments are often difficult and expensive to make. To bypass t...
research
09/07/2018

Protection of Information from Imitation on the Basis of Crypt-Code Structures

A system is offered for imitation resistant transmitting of encrypted in...

Please sign up or login with your details

Forgot password? Click here to reset