A Method for Blind Recognition of Convolution Code Based on Euclidean Algorithm

Author(s):  
Fenghua Wang ◽  
Zhitao Huang ◽  
Yiyu Zhou
2020 ◽  
Vol 56 (21) ◽  
pp. 1154-1156
Author(s):  
Ming Yu ◽  
Feifei Zheng ◽  
Junwei Ma ◽  
Jingying Zhang

2015 ◽  
Vol 740 ◽  
pp. 692-695
Author(s):  
Yong Wei Sun ◽  
Li Min Zhang ◽  
Xiao Lei Fan

As to the problem of blind recognition for convolutional code, the existing recognitory methods’ principle and process are summarized, and they are simulated and analyzed with Matlab. Four methods are introduced for the recognition of generation polynomials, and the comparison of these methods shows that the Euclidean algorithm works better at low BER, while the method based Walsh-Hadamard transform has a better accuracy when BER is as high as 10-2.


2017 ◽  
Vol 9 (1) ◽  
Author(s):  
František Marko ◽  
Alexandr N. Zubkov ◽  
Martin Juráš

AbstractWe develop a public-key cryptosystem based on invariants of diagonalizable groups and investigate properties of such a cryptosystem first over finite fields, then over number fields and finally over finite rings. We consider the security of these cryptosystem and show that it is necessary to restrict the set of parameters of the system to prevent various attacks (including linear algebra attacks and attacks based on the Euclidean algorithm).


Author(s):  
Shunjiang Ma ◽  
Gaicheng Liu ◽  
Zhiwu Huang

With the development of sports in colleges and universities, the research on innovation reform of sports industry has been deepened. Therefore, based on the above situation, a study of the status quo and development direction of sports industry in colleges and universities based on the Euclid algorithm is proposed. In the research here, according to the traditional sports industry concept to sum up, and then according to the advantages of computer technology to deal with the relevant data. In order to realize good overlap between data, an application of Euclidean algorithm is proposed. In the test of Euclidean algorithm, the efficiency and function of the algorithm are tested comprehensively, and the test results show that the research is feasible.


2003 ◽  
Vol 32 (2) ◽  
pp. 548-556 ◽  
Author(s):  
Xinmao Wang ◽  
Victor Y. Pan

1990 ◽  
Vol 74 (467) ◽  
pp. 47 ◽  
Author(s):  
Ian Cook
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document