2004it Extrinsic Information Transfer Functions - Model and Erasure Channel Properties

合集下载

南开大学22春“信息安全”《信息隐藏技术》作业考核题库高频考点版(参考答案)试题号3

南开大学22春“信息安全”《信息隐藏技术》作业考核题库高频考点版(参考答案)试题号3

南开大学22春“信息安全”《信息隐藏技术》作业考核题库高频考点版(参考答案)一.综合考核(共50题)1.数字水印从其表现形式上可以分为几大类:()A.一类是一串有意义的字符B.一类是一串伪随机序列C.一类是一个可视的图片参考答案:ABC2.人眼在一定距离上能区分开相邻两点的能力称为分辨力。

人眼分辨力受物体运动速度影响,人眼对高速运动的物体的分辨力强于对低速运动的物体的分辨力。

()T.对F.错参考答案:T3.数字指纹水印中需要嵌入购买者的个人信息。

()T.对F.错参考答案:T4.卡方分析的原理是()。

A.利用图像空间相关性进行隐写分析B.非负和非正翻转对自然图像和隐写图像的干扰程度不同C.图像隐写后,灰度值为2i和2i+1的像素出现频率趋于相等D.图像隐写后,其穿越平面簇z=0. 5,2. 5,4. 5,...的次数增加参考答案:C5.根据识别篡改的能力,可以将脆弱性水印划分为以下四个层次:()。

A.完全脆弱性水印B.半脆弱水印C.图像可视内容鉴别D.自嵌入水印参考答案:ABCD6.异时掩蔽可分为()和滞后掩蔽。

A.同时掩蔽B.时域掩蔽C.频域掩蔽D.超前掩蔽参考答案:D7.判断载体中是否有秘密消息隐藏其中,可能会出现以下四种情况,其中()属于弃真错误。

A.实际有隐藏,判断无隐藏B.实际有隐藏,判断有隐藏C.实际无隐藏,判断有隐藏D.实际无隐藏,判断无隐藏参考答案:A8.卡方分析的原理是()。

A.利用图像空间相关性进行隐写分析。

B.非负和非正翻转对自然图像和隐写图像的干扰程度不同。

C.图像隐写后,灰度值为2i和2i+1的像素出现频率趋于相等。

D.图像隐写后,其穿越平面簇z=0.5,2.5,4.5,...的次数增加。

参考答案:C9.《全国信息隐藏暨多媒体信息安全学术大会》(CIHW)开始于()年。

A.1990B.1992C.1996D.1999参考答案:D10.对二值图像可采用调整区域黑白像素比例的方法嵌入秘密信息。

Unit 04 译文

Unit 04 译文

Unit 4 通信和信息论Unit 4-1第一部分:远程通信远程通信是远距离通信的信号传输,在现代,通常这个过程需要电子发射机发射电磁波,但是在早期远程通信包括使用烟火信号,鼓或旗语或日光仪。

今天,远程通信很普遍的,助推这一过程的设备如电视,无线电和电话在世界的许多地区都已很普遍。

还有连接这些设备的许多网络,包括计算机网络,公共电话网,无线电网和电视网络。

互联网上的计算机通信是众多通信的一个例子。

通信系统通常由通信工程师设计。

在这个领域中早期的发明家有Alexander Graham Bell, Guglielmo Marconi 和John Logie Baird。

通信在当今的世界经济发展中起着举足轻重的作用,通信产业的税收在世界总产值的比例已接近百分之三。

基本要素每个通信系统包括三个基本要素:采集信息并能将其转换为信号的发射机,传输信号的传输媒介,接收信号并能将其还原为有用信息的接收机。

考虑一个无线电广播的例子。

广播塔是发射机,收音机是接收机,传输媒介是自由空间。

通常通信系统都是双向的,一个设备既做发射机又做接收机,即收发器。

例如,移动手机就是一个收发器。

电话线上的通信称为点对点通信,因为只在一个发射机和一个接收机之间。

通过无线电广播的通信称为广播(一对多)通信,因为通信是在一个大功率的发射机和许多接收机之间。

模拟或数字信号可以是模拟的,也可以是数字的。

在模拟信号中,信号根据信息而连续变化。

在数字信号信息被编码为一组离散值(如,1和0)。

在传输过程中,模拟信号中的信息会因噪声而退化。

相反,只要噪声不超过一定的阈值,数字信号中的信息是不会丢失的。

这是数字信号相对于模拟信号一个关键的优点。

网络网络是由一个相互通信的发射机、接收机或收发机的集合。

数字网络由一个或多个路由器组成,路由器正确地将数据发送给用户。

模拟网路由一个或多个交换器组成,交换器在两个或多个用户间建立连接。

这两种网络都需要中继器,用于远距离传输时的放大或重建信号。

EXIT图在迭代过程分析中的应用

EXIT图在迭代过程分析中的应用
同一时期,LDPC 码迭代译码算法的分析工具密度进化算法也在文献[13][14]中发展成熟, 并用于指导码的设计和优化。早在 1963 年出版的 Gallager 的 LDPC 专论[12]中就提出了通 过跟踪外部对数似然比(Extrinsic Log-Likelihood Ratio)的概率分布来估计 LDPC 码迭代 译码器收敛性能的方法。这个过程在删除信道条件下很简单,因为只需要计算从一个分量译 码器到另一个分量译码器删除元的比例;然而对于其他信道条件密度进化算法似乎必须得到 整个信道概率密度函数。事实上,这个过程可以通过很多方式得到简化。首先,经验告诉我 们针对删除信道的好码在许多实际信道中也有很好的特性,因此可以首先针对删除信道设计 编码,再将其应用于实际信道[15]。第二种方式是每次迭代只跟踪外部对数似然比的一个统 计量,而不是整个概率密度函数,这个统计量可以是均值、方差、误码率、保真度或者互信 息。当考虑跟踪逐位平均互信息时,就可引出 EXIT 图。
μZ
=
σ
2 Z
2
<6>
( ) 从而信道观测对数似然值 Z 的高斯分布可用一个参数描述为 Z ~ N
±
σ
2 Z
2

2 Z

图 2 的结构是完全对称的,在大交织器假设下,我们可以忽略 RSC 的尾比特效应,两 个分量译码器的实现就完全一致了,因此可以将注意力集中到单个分量码译码器的外信息转 移特性上,而省略其下标。
2 外信息转移函数
2.1 PCC的迭代译码器
图 2 PCC 的迭代译码器[1]
PCC 的迭代译码器的典型结构框图如图 2 所示。PCC 的分量码选用系统递归卷积码 (RSC),在每次迭代中,分量译码器 1 将系统(信息)比特位及其相应校验比特的内部信 息(信道观测)Z1 作为输入,输出软信息 D1。系统比特对应的外部信息 E1 = D1 − A1 − Z1 通 过交织器后作为先验信息 A2 输入分量译码器 2,其另外一个输入是交织重排后的系统比特 及其校验比特的信道观测 Z2,同时输出外部信息 E2 = D2 − A2 − Z2 反馈至分量译码器 1 作为 其先验输入信息 A1。这里所涉及的变量 Z1,A1,D1,E1,Z2,A2,D2 和 E2 均是对数似然 比(L 值[4])。文献[4]对 L 值的代数运算体系给出了详细的推导。

中文MISRA-C-2004

中文MISRA-C-2004

The Motor Industry Software Reliability AssociationMISRA-C-:2004 Guidelinesfor the useof theC languagein critical systems 中文版1背景 —— C的使用和问题 (3)1.1汽车工业中C的使用 (3)1.2语言的不安全性和C语言 (3)1.3安全相关系统中C的使用 (4)1.4标准化 (5)2MISRA-C:视野 (6)2.1MISRA-C的发布说明 (6)2.2MISRA-C的目标 (6)3MISRA-C:范围 (7)3.1基本的语言问题 (7)3.2未指出的问题 (7)3.3可应用性 (7)3.4预备知识 (7)3.5C++问题 (7)3.6自动产生代码的问题 (8)4使用MISRA-C (9)4.1软件工程环境 (9)4.2编程语言和编码环境 (9)4.3采用子集(subset) (11)4.4符合性声明(Claiming compliance) (13)4.5持续改进 (13)5规则简介 (14)5.1规则分类 (14)5.2规则的组织 (14)5.3规则的冗余 (14)5.4规则的形式 (14)5.5理解原始参考 (15)5.6规则的范围 (17)6规则 (18)6.1环境 (18)6.2语言扩展 (19)6.3文档 (19)6.4字符集 (21)6.5标识符 (21)6.6类型 (23)6.7常量 (24)6.8声明与定义 (25)6.9初始化 (27)6.10数值类型转换 (27)6.11指针类型转换 (36)6.12表达式 (37)6.13控制语句表达式 (43)6.14控制流 (45)6.15switch语句 (48)6.16函数 (50)6.17指针和数组 (51)6.18结构与联合 (54)6.19预处理指令 (57)6.20标准库 (62)6.21运行时错误 (64)7References (66)Appendix A: Summary of rules (68)Appendix B:MISRA-C :1998 到 MISRA-C :2004 规则映射 (74)Appendix C:MISRA-C:1998 – 已废除的规则 (81)Appendix D:ISO标准交互参考 (82)Appendix E : 术语表 (85)1背景——C的使用和问题1.1 汽车工业中C的使用MISRA-C:1998 [1] 发布于1998年。

3GPP TS 36.331 V13.2.0 (2016-06)

3GPP TS 36.331 V13.2.0 (2016-06)

3GPP TS 36.331 V13.2.0 (2016-06)Technical Specification3rd Generation Partnership Project;Technical Specification Group Radio Access Network;Evolved Universal Terrestrial Radio Access (E-UTRA);Radio Resource Control (RRC);Protocol specification(Release 13)The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP. The present document has not been subject to any approval process by the 3GPP Organizational Partners and shall not be implemented.This Specification is provided for future development work within 3GPP only. The Organizational Partners accept no liability for any use of this Specification. Specifications and reports for implementation of the 3GPP TM system should be obtained via the 3GPP Organizational Partners' Publications Offices.KeywordsUMTS, radio3GPPPostal address3GPP support office address650 Route des Lucioles - Sophia AntipolisValbonne - FRANCETel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16InternetCopyright NotificationNo part may be reproduced except as authorized by written permission.The copyright and the foregoing restriction extend to reproduction in all media.© 2016, 3GPP Organizational Partners (ARIB, ATIS, CCSA, ETSI, TSDSI, TTA, TTC).All rights reserved.UMTS™ is a Trade Mark of ETSI registered for the benefit of its members3GPP™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational PartnersLTE™ is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners GSM® and the GSM logo are registered and owned by the GSM AssociationBluetooth® is a Trade Mark of the Bluetooth SIG registered for the benefit of its membersContentsForeword (18)1Scope (19)2References (19)3Definitions, symbols and abbreviations (22)3.1Definitions (22)3.2Abbreviations (24)4General (27)4.1Introduction (27)4.2Architecture (28)4.2.1UE states and state transitions including inter RAT (28)4.2.2Signalling radio bearers (29)4.3Services (30)4.3.1Services provided to upper layers (30)4.3.2Services expected from lower layers (30)4.4Functions (30)5Procedures (32)5.1General (32)5.1.1Introduction (32)5.1.2General requirements (32)5.2System information (33)5.2.1Introduction (33)5.2.1.1General (33)5.2.1.2Scheduling (34)5.2.1.2a Scheduling for NB-IoT (34)5.2.1.3System information validity and notification of changes (35)5.2.1.4Indication of ETWS notification (36)5.2.1.5Indication of CMAS notification (37)5.2.1.6Notification of EAB parameters change (37)5.2.1.7Access Barring parameters change in NB-IoT (37)5.2.2System information acquisition (38)5.2.2.1General (38)5.2.2.2Initiation (38)5.2.2.3System information required by the UE (38)5.2.2.4System information acquisition by the UE (39)5.2.2.5Essential system information missing (42)5.2.2.6Actions upon reception of the MasterInformationBlock message (42)5.2.2.7Actions upon reception of the SystemInformationBlockType1 message (42)5.2.2.8Actions upon reception of SystemInformation messages (44)5.2.2.9Actions upon reception of SystemInformationBlockType2 (44)5.2.2.10Actions upon reception of SystemInformationBlockType3 (45)5.2.2.11Actions upon reception of SystemInformationBlockType4 (45)5.2.2.12Actions upon reception of SystemInformationBlockType5 (45)5.2.2.13Actions upon reception of SystemInformationBlockType6 (45)5.2.2.14Actions upon reception of SystemInformationBlockType7 (45)5.2.2.15Actions upon reception of SystemInformationBlockType8 (45)5.2.2.16Actions upon reception of SystemInformationBlockType9 (46)5.2.2.17Actions upon reception of SystemInformationBlockType10 (46)5.2.2.18Actions upon reception of SystemInformationBlockType11 (46)5.2.2.19Actions upon reception of SystemInformationBlockType12 (47)5.2.2.20Actions upon reception of SystemInformationBlockType13 (48)5.2.2.21Actions upon reception of SystemInformationBlockType14 (48)5.2.2.22Actions upon reception of SystemInformationBlockType15 (48)5.2.2.23Actions upon reception of SystemInformationBlockType16 (48)5.2.2.24Actions upon reception of SystemInformationBlockType17 (48)5.2.2.25Actions upon reception of SystemInformationBlockType18 (48)5.2.2.26Actions upon reception of SystemInformationBlockType19 (49)5.2.3Acquisition of an SI message (49)5.2.3a Acquisition of an SI message by BL UE or UE in CE or a NB-IoT UE (50)5.3Connection control (50)5.3.1Introduction (50)5.3.1.1RRC connection control (50)5.3.1.2Security (52)5.3.1.2a RN security (53)5.3.1.3Connected mode mobility (53)5.3.1.4Connection control in NB-IoT (54)5.3.2Paging (55)5.3.2.1General (55)5.3.2.2Initiation (55)5.3.2.3Reception of the Paging message by the UE (55)5.3.3RRC connection establishment (56)5.3.3.1General (56)5.3.3.1a Conditions for establishing RRC Connection for sidelink communication/ discovery (58)5.3.3.2Initiation (59)5.3.3.3Actions related to transmission of RRCConnectionRequest message (63)5.3.3.3a Actions related to transmission of RRCConnectionResumeRequest message (64)5.3.3.4Reception of the RRCConnectionSetup by the UE (64)5.3.3.4a Reception of the RRCConnectionResume by the UE (66)5.3.3.5Cell re-selection while T300, T302, T303, T305, T306, or T308 is running (68)5.3.3.6T300 expiry (68)5.3.3.7T302, T303, T305, T306, or T308 expiry or stop (69)5.3.3.8Reception of the RRCConnectionReject by the UE (70)5.3.3.9Abortion of RRC connection establishment (71)5.3.3.10Handling of SSAC related parameters (71)5.3.3.11Access barring check (72)5.3.3.12EAB check (73)5.3.3.13Access barring check for ACDC (73)5.3.3.14Access Barring check for NB-IoT (74)5.3.4Initial security activation (75)5.3.4.1General (75)5.3.4.2Initiation (76)5.3.4.3Reception of the SecurityModeCommand by the UE (76)5.3.5RRC connection reconfiguration (77)5.3.5.1General (77)5.3.5.2Initiation (77)5.3.5.3Reception of an RRCConnectionReconfiguration not including the mobilityControlInfo by theUE (77)5.3.5.4Reception of an RRCConnectionReconfiguration including the mobilityControlInfo by the UE(handover) (79)5.3.5.5Reconfiguration failure (83)5.3.5.6T304 expiry (handover failure) (83)5.3.5.7Void (84)5.3.5.7a T307 expiry (SCG change failure) (84)5.3.5.8Radio Configuration involving full configuration option (84)5.3.6Counter check (86)5.3.6.1General (86)5.3.6.2Initiation (86)5.3.6.3Reception of the CounterCheck message by the UE (86)5.3.7RRC connection re-establishment (87)5.3.7.1General (87)5.3.7.2Initiation (87)5.3.7.3Actions following cell selection while T311 is running (88)5.3.7.4Actions related to transmission of RRCConnectionReestablishmentRequest message (89)5.3.7.5Reception of the RRCConnectionReestablishment by the UE (89)5.3.7.6T311 expiry (91)5.3.7.7T301 expiry or selected cell no longer suitable (91)5.3.7.8Reception of RRCConnectionReestablishmentReject by the UE (91)5.3.8RRC connection release (92)5.3.8.1General (92)5.3.8.2Initiation (92)5.3.8.3Reception of the RRCConnectionRelease by the UE (92)5.3.8.4T320 expiry (93)5.3.9RRC connection release requested by upper layers (93)5.3.9.1General (93)5.3.9.2Initiation (93)5.3.10Radio resource configuration (93)5.3.10.0General (93)5.3.10.1SRB addition/ modification (94)5.3.10.2DRB release (95)5.3.10.3DRB addition/ modification (95)5.3.10.3a1DC specific DRB addition or reconfiguration (96)5.3.10.3a2LWA specific DRB addition or reconfiguration (98)5.3.10.3a3LWIP specific DRB addition or reconfiguration (98)5.3.10.3a SCell release (99)5.3.10.3b SCell addition/ modification (99)5.3.10.3c PSCell addition or modification (99)5.3.10.4MAC main reconfiguration (99)5.3.10.5Semi-persistent scheduling reconfiguration (100)5.3.10.6Physical channel reconfiguration (100)5.3.10.7Radio Link Failure Timers and Constants reconfiguration (101)5.3.10.8Time domain measurement resource restriction for serving cell (101)5.3.10.9Other configuration (102)5.3.10.10SCG reconfiguration (103)5.3.10.11SCG dedicated resource configuration (104)5.3.10.12Reconfiguration SCG or split DRB by drb-ToAddModList (105)5.3.10.13Neighbour cell information reconfiguration (105)5.3.10.14Void (105)5.3.10.15Sidelink dedicated configuration (105)5.3.10.16T370 expiry (106)5.3.11Radio link failure related actions (107)5.3.11.1Detection of physical layer problems in RRC_CONNECTED (107)5.3.11.2Recovery of physical layer problems (107)5.3.11.3Detection of radio link failure (107)5.3.12UE actions upon leaving RRC_CONNECTED (109)5.3.13UE actions upon PUCCH/ SRS release request (110)5.3.14Proximity indication (110)5.3.14.1General (110)5.3.14.2Initiation (111)5.3.14.3Actions related to transmission of ProximityIndication message (111)5.3.15Void (111)5.4Inter-RAT mobility (111)5.4.1Introduction (111)5.4.2Handover to E-UTRA (112)5.4.2.1General (112)5.4.2.2Initiation (112)5.4.2.3Reception of the RRCConnectionReconfiguration by the UE (112)5.4.2.4Reconfiguration failure (114)5.4.2.5T304 expiry (handover to E-UTRA failure) (114)5.4.3Mobility from E-UTRA (114)5.4.3.1General (114)5.4.3.2Initiation (115)5.4.3.3Reception of the MobilityFromEUTRACommand by the UE (115)5.4.3.4Successful completion of the mobility from E-UTRA (116)5.4.3.5Mobility from E-UTRA failure (117)5.4.4Handover from E-UTRA preparation request (CDMA2000) (117)5.4.4.1General (117)5.4.4.2Initiation (118)5.4.4.3Reception of the HandoverFromEUTRAPreparationRequest by the UE (118)5.4.5UL handover preparation transfer (CDMA2000) (118)5.4.5.1General (118)5.4.5.2Initiation (118)5.4.5.3Actions related to transmission of the ULHandoverPreparationTransfer message (119)5.4.5.4Failure to deliver the ULHandoverPreparationTransfer message (119)5.4.6Inter-RAT cell change order to E-UTRAN (119)5.4.6.1General (119)5.4.6.2Initiation (119)5.4.6.3UE fails to complete an inter-RAT cell change order (119)5.5Measurements (120)5.5.1Introduction (120)5.5.2Measurement configuration (121)5.5.2.1General (121)5.5.2.2Measurement identity removal (122)5.5.2.2a Measurement identity autonomous removal (122)5.5.2.3Measurement identity addition/ modification (123)5.5.2.4Measurement object removal (124)5.5.2.5Measurement object addition/ modification (124)5.5.2.6Reporting configuration removal (126)5.5.2.7Reporting configuration addition/ modification (127)5.5.2.8Quantity configuration (127)5.5.2.9Measurement gap configuration (127)5.5.2.10Discovery signals measurement timing configuration (128)5.5.2.11RSSI measurement timing configuration (128)5.5.3Performing measurements (128)5.5.3.1General (128)5.5.3.2Layer 3 filtering (131)5.5.4Measurement report triggering (131)5.5.4.1General (131)5.5.4.2Event A1 (Serving becomes better than threshold) (135)5.5.4.3Event A2 (Serving becomes worse than threshold) (136)5.5.4.4Event A3 (Neighbour becomes offset better than PCell/ PSCell) (136)5.5.4.5Event A4 (Neighbour becomes better than threshold) (137)5.5.4.6Event A5 (PCell/ PSCell becomes worse than threshold1 and neighbour becomes better thanthreshold2) (138)5.5.4.6a Event A6 (Neighbour becomes offset better than SCell) (139)5.5.4.7Event B1 (Inter RAT neighbour becomes better than threshold) (139)5.5.4.8Event B2 (PCell becomes worse than threshold1 and inter RAT neighbour becomes better thanthreshold2) (140)5.5.4.9Event C1 (CSI-RS resource becomes better than threshold) (141)5.5.4.10Event C2 (CSI-RS resource becomes offset better than reference CSI-RS resource) (141)5.5.4.11Event W1 (WLAN becomes better than a threshold) (142)5.5.4.12Event W2 (All WLAN inside WLAN mobility set becomes worse than threshold1 and a WLANoutside WLAN mobility set becomes better than threshold2) (142)5.5.4.13Event W3 (All WLAN inside WLAN mobility set becomes worse than a threshold) (143)5.5.5Measurement reporting (144)5.5.6Measurement related actions (148)5.5.6.1Actions upon handover and re-establishment (148)5.5.6.2Speed dependant scaling of measurement related parameters (149)5.5.7Inter-frequency RSTD measurement indication (149)5.5.7.1General (149)5.5.7.2Initiation (150)5.5.7.3Actions related to transmission of InterFreqRSTDMeasurementIndication message (150)5.6Other (150)5.6.0General (150)5.6.1DL information transfer (151)5.6.1.1General (151)5.6.1.2Initiation (151)5.6.1.3Reception of the DLInformationTransfer by the UE (151)5.6.2UL information transfer (151)5.6.2.1General (151)5.6.2.2Initiation (151)5.6.2.3Actions related to transmission of ULInformationTransfer message (152)5.6.2.4Failure to deliver ULInformationTransfer message (152)5.6.3UE capability transfer (152)5.6.3.1General (152)5.6.3.2Initiation (153)5.6.3.3Reception of the UECapabilityEnquiry by the UE (153)5.6.4CSFB to 1x Parameter transfer (157)5.6.4.1General (157)5.6.4.2Initiation (157)5.6.4.3Actions related to transmission of CSFBParametersRequestCDMA2000 message (157)5.6.4.4Reception of the CSFBParametersResponseCDMA2000 message (157)5.6.5UE Information (158)5.6.5.1General (158)5.6.5.2Initiation (158)5.6.5.3Reception of the UEInformationRequest message (158)5.6.6 Logged Measurement Configuration (159)5.6.6.1General (159)5.6.6.2Initiation (160)5.6.6.3Reception of the LoggedMeasurementConfiguration by the UE (160)5.6.6.4T330 expiry (160)5.6.7 Release of Logged Measurement Configuration (160)5.6.7.1General (160)5.6.7.2Initiation (160)5.6.8 Measurements logging (161)5.6.8.1General (161)5.6.8.2Initiation (161)5.6.9In-device coexistence indication (163)5.6.9.1General (163)5.6.9.2Initiation (164)5.6.9.3Actions related to transmission of InDeviceCoexIndication message (164)5.6.10UE Assistance Information (165)5.6.10.1General (165)5.6.10.2Initiation (166)5.6.10.3Actions related to transmission of UEAssistanceInformation message (166)5.6.11 Mobility history information (166)5.6.11.1General (166)5.6.11.2Initiation (166)5.6.12RAN-assisted WLAN interworking (167)5.6.12.1General (167)5.6.12.2Dedicated WLAN offload configuration (167)5.6.12.3WLAN offload RAN evaluation (167)5.6.12.4T350 expiry or stop (167)5.6.12.5Cell selection/ re-selection while T350 is running (168)5.6.13SCG failure information (168)5.6.13.1General (168)5.6.13.2Initiation (168)5.6.13.3Actions related to transmission of SCGFailureInformation message (168)5.6.14LTE-WLAN Aggregation (169)5.6.14.1Introduction (169)5.6.14.2Reception of LWA configuration (169)5.6.14.3Release of LWA configuration (170)5.6.15WLAN connection management (170)5.6.15.1Introduction (170)5.6.15.2WLAN connection status reporting (170)5.6.15.2.1General (170)5.6.15.2.2Initiation (171)5.6.15.2.3Actions related to transmission of WLANConnectionStatusReport message (171)5.6.15.3T351 Expiry (WLAN connection attempt timeout) (171)5.6.15.4WLAN status monitoring (171)5.6.16RAN controlled LTE-WLAN interworking (172)5.6.16.1General (172)5.6.16.2WLAN traffic steering command (172)5.6.17LTE-WLAN aggregation with IPsec tunnel (173)5.6.17.1General (173)5.7Generic error handling (174)5.7.1General (174)5.7.2ASN.1 violation or encoding error (174)5.7.3Field set to a not comprehended value (174)5.7.4Mandatory field missing (174)5.7.5Not comprehended field (176)5.8MBMS (176)5.8.1Introduction (176)5.8.1.1General (176)5.8.1.2Scheduling (176)5.8.1.3MCCH information validity and notification of changes (176)5.8.2MCCH information acquisition (178)5.8.2.1General (178)5.8.2.2Initiation (178)5.8.2.3MCCH information acquisition by the UE (178)5.8.2.4Actions upon reception of the MBSFNAreaConfiguration message (178)5.8.2.5Actions upon reception of the MBMSCountingRequest message (179)5.8.3MBMS PTM radio bearer configuration (179)5.8.3.1General (179)5.8.3.2Initiation (179)5.8.3.3MRB establishment (179)5.8.3.4MRB release (179)5.8.4MBMS Counting Procedure (179)5.8.4.1General (179)5.8.4.2Initiation (180)5.8.4.3Reception of the MBMSCountingRequest message by the UE (180)5.8.5MBMS interest indication (181)5.8.5.1General (181)5.8.5.2Initiation (181)5.8.5.3Determine MBMS frequencies of interest (182)5.8.5.4Actions related to transmission of MBMSInterestIndication message (183)5.8a SC-PTM (183)5.8a.1Introduction (183)5.8a.1.1General (183)5.8a.1.2SC-MCCH scheduling (183)5.8a.1.3SC-MCCH information validity and notification of changes (183)5.8a.1.4Procedures (184)5.8a.2SC-MCCH information acquisition (184)5.8a.2.1General (184)5.8a.2.2Initiation (184)5.8a.2.3SC-MCCH information acquisition by the UE (184)5.8a.2.4Actions upon reception of the SCPTMConfiguration message (185)5.8a.3SC-PTM radio bearer configuration (185)5.8a.3.1General (185)5.8a.3.2Initiation (185)5.8a.3.3SC-MRB establishment (185)5.8a.3.4SC-MRB release (185)5.9RN procedures (186)5.9.1RN reconfiguration (186)5.9.1.1General (186)5.9.1.2Initiation (186)5.9.1.3Reception of the RNReconfiguration by the RN (186)5.10Sidelink (186)5.10.1Introduction (186)5.10.1a Conditions for sidelink communication operation (187)5.10.2Sidelink UE information (188)5.10.2.1General (188)5.10.2.2Initiation (189)5.10.2.3Actions related to transmission of SidelinkUEInformation message (193)5.10.3Sidelink communication monitoring (195)5.10.6Sidelink discovery announcement (198)5.10.6a Sidelink discovery announcement pool selection (201)5.10.6b Sidelink discovery announcement reference carrier selection (201)5.10.7Sidelink synchronisation information transmission (202)5.10.7.1General (202)5.10.7.2Initiation (203)5.10.7.3Transmission of SLSS (204)5.10.7.4Transmission of MasterInformationBlock-SL message (205)5.10.7.5Void (206)5.10.8Sidelink synchronisation reference (206)5.10.8.1General (206)5.10.8.2Selection and reselection of synchronisation reference UE (SyncRef UE) (206)5.10.9Sidelink common control information (207)5.10.9.1General (207)5.10.9.2Actions related to reception of MasterInformationBlock-SL message (207)5.10.10Sidelink relay UE operation (207)5.10.10.1General (207)5.10.10.2AS-conditions for relay related sidelink communication transmission by sidelink relay UE (207)5.10.10.3AS-conditions for relay PS related sidelink discovery transmission by sidelink relay UE (208)5.10.10.4Sidelink relay UE threshold conditions (208)5.10.11Sidelink remote UE operation (208)5.10.11.1General (208)5.10.11.2AS-conditions for relay related sidelink communication transmission by sidelink remote UE (208)5.10.11.3AS-conditions for relay PS related sidelink discovery transmission by sidelink remote UE (209)5.10.11.4Selection and reselection of sidelink relay UE (209)5.10.11.5Sidelink remote UE threshold conditions (210)6Protocol data units, formats and parameters (tabular & ASN.1) (210)6.1General (210)6.2RRC messages (212)6.2.1General message structure (212)–EUTRA-RRC-Definitions (212)–BCCH-BCH-Message (212)–BCCH-DL-SCH-Message (212)–BCCH-DL-SCH-Message-BR (213)–MCCH-Message (213)–PCCH-Message (213)–DL-CCCH-Message (214)–DL-DCCH-Message (214)–UL-CCCH-Message (214)–UL-DCCH-Message (215)–SC-MCCH-Message (215)6.2.2Message definitions (216)–CounterCheck (216)–CounterCheckResponse (217)–CSFBParametersRequestCDMA2000 (217)–CSFBParametersResponseCDMA2000 (218)–DLInformationTransfer (218)–HandoverFromEUTRAPreparationRequest (CDMA2000) (219)–InDeviceCoexIndication (220)–InterFreqRSTDMeasurementIndication (222)–LoggedMeasurementConfiguration (223)–MasterInformationBlock (225)–MBMSCountingRequest (226)–MBMSCountingResponse (226)–MBMSInterestIndication (227)–MBSFNAreaConfiguration (228)–MeasurementReport (228)–MobilityFromEUTRACommand (229)–Paging (232)–ProximityIndication (233)–RNReconfiguration (234)–RNReconfigurationComplete (234)–RRCConnectionReconfiguration (235)–RRCConnectionReconfigurationComplete (240)–RRCConnectionReestablishment (241)–RRCConnectionReestablishmentComplete (241)–RRCConnectionReestablishmentReject (242)–RRCConnectionReestablishmentRequest (243)–RRCConnectionReject (243)–RRCConnectionRelease (244)–RRCConnectionResume (248)–RRCConnectionResumeComplete (249)–RRCConnectionResumeRequest (250)–RRCConnectionRequest (250)–RRCConnectionSetup (251)–RRCConnectionSetupComplete (252)–SCGFailureInformation (253)–SCPTMConfiguration (254)–SecurityModeCommand (255)–SecurityModeComplete (255)–SecurityModeFailure (256)–SidelinkUEInformation (256)–SystemInformation (258)–SystemInformationBlockType1 (259)–UEAssistanceInformation (264)–UECapabilityEnquiry (265)–UECapabilityInformation (266)–UEInformationRequest (267)–UEInformationResponse (267)–ULHandoverPreparationTransfer (CDMA2000) (273)–ULInformationTransfer (274)–WLANConnectionStatusReport (274)6.3RRC information elements (275)6.3.1System information blocks (275)–SystemInformationBlockType2 (275)–SystemInformationBlockType3 (279)–SystemInformationBlockType4 (282)–SystemInformationBlockType5 (283)–SystemInformationBlockType6 (287)–SystemInformationBlockType7 (289)–SystemInformationBlockType8 (290)–SystemInformationBlockType9 (295)–SystemInformationBlockType10 (295)–SystemInformationBlockType11 (296)–SystemInformationBlockType12 (297)–SystemInformationBlockType13 (297)–SystemInformationBlockType14 (298)–SystemInformationBlockType15 (298)–SystemInformationBlockType16 (299)–SystemInformationBlockType17 (300)–SystemInformationBlockType18 (301)–SystemInformationBlockType19 (301)–SystemInformationBlockType20 (304)6.3.2Radio resource control information elements (304)–AntennaInfo (304)–AntennaInfoUL (306)–CQI-ReportConfig (307)–CQI-ReportPeriodicProcExtId (314)–CrossCarrierSchedulingConfig (314)–CSI-IM-Config (315)–CSI-IM-ConfigId (315)–CSI-RS-Config (317)–CSI-RS-ConfigEMIMO (318)–CSI-RS-ConfigNZP (319)–CSI-RS-ConfigNZPId (320)–CSI-RS-ConfigZP (321)–CSI-RS-ConfigZPId (321)–DMRS-Config (321)–DRB-Identity (322)–EPDCCH-Config (322)–EIMTA-MainConfig (324)–LogicalChannelConfig (325)–LWA-Configuration (326)–LWIP-Configuration (326)–RCLWI-Configuration (327)–MAC-MainConfig (327)–P-C-AndCBSR (332)–PDCCH-ConfigSCell (333)–PDCP-Config (334)–PDSCH-Config (337)–PDSCH-RE-MappingQCL-ConfigId (339)–PHICH-Config (339)–PhysicalConfigDedicated (339)–P-Max (344)–PRACH-Config (344)–PresenceAntennaPort1 (346)–PUCCH-Config (347)–PUSCH-Config (351)–RACH-ConfigCommon (355)–RACH-ConfigDedicated (357)–RadioResourceConfigCommon (358)–RadioResourceConfigDedicated (362)–RLC-Config (367)–RLF-TimersAndConstants (369)–RN-SubframeConfig (370)–SchedulingRequestConfig (371)–SoundingRS-UL-Config (372)–SPS-Config (375)–TDD-Config (376)–TimeAlignmentTimer (377)–TPC-PDCCH-Config (377)–TunnelConfigLWIP (378)–UplinkPowerControl (379)–WLAN-Id-List (382)–WLAN-MobilityConfig (382)6.3.3Security control information elements (382)–NextHopChainingCount (382)–SecurityAlgorithmConfig (383)–ShortMAC-I (383)6.3.4Mobility control information elements (383)–AdditionalSpectrumEmission (383)–ARFCN-ValueCDMA2000 (383)–ARFCN-ValueEUTRA (384)–ARFCN-ValueGERAN (384)–ARFCN-ValueUTRA (384)–BandclassCDMA2000 (384)–BandIndicatorGERAN (385)–CarrierFreqCDMA2000 (385)–CarrierFreqGERAN (385)–CellIndexList (387)–CellReselectionPriority (387)–CellSelectionInfoCE (387)–CellReselectionSubPriority (388)–CSFB-RegistrationParam1XRTT (388)–CellGlobalIdEUTRA (389)–CellGlobalIdUTRA (389)–CellGlobalIdGERAN (390)–CellGlobalIdCDMA2000 (390)–CellSelectionInfoNFreq (391)–CSG-Identity (391)–FreqBandIndicator (391)–MobilityControlInfo (391)–MobilityParametersCDMA2000 (1xRTT) (393)–MobilityStateParameters (394)–MultiBandInfoList (394)–NS-PmaxList (394)–PhysCellId (395)–PhysCellIdRange (395)–PhysCellIdRangeUTRA-FDDList (395)–PhysCellIdCDMA2000 (396)–PhysCellIdGERAN (396)–PhysCellIdUTRA-FDD (396)–PhysCellIdUTRA-TDD (396)–PLMN-Identity (397)–PLMN-IdentityList3 (397)–PreRegistrationInfoHRPD (397)–Q-QualMin (398)–Q-RxLevMin (398)–Q-OffsetRange (398)–Q-OffsetRangeInterRAT (399)–ReselectionThreshold (399)–ReselectionThresholdQ (399)–SCellIndex (399)–ServCellIndex (400)–SpeedStateScaleFactors (400)–SystemInfoListGERAN (400)–SystemTimeInfoCDMA2000 (401)–TrackingAreaCode (401)–T-Reselection (402)–T-ReselectionEUTRA-CE (402)6.3.5Measurement information elements (402)–AllowedMeasBandwidth (402)–CSI-RSRP-Range (402)–Hysteresis (402)–LocationInfo (403)–MBSFN-RSRQ-Range (403)–MeasConfig (404)–MeasDS-Config (405)–MeasGapConfig (406)–MeasId (407)–MeasIdToAddModList (407)–MeasObjectCDMA2000 (408)–MeasObjectEUTRA (408)–MeasObjectGERAN (412)–MeasObjectId (412)–MeasObjectToAddModList (412)–MeasObjectUTRA (413)–ReportConfigEUTRA (422)–ReportConfigId (425)–ReportConfigInterRAT (425)–ReportConfigToAddModList (428)–ReportInterval (429)–RSRP-Range (429)–RSRQ-Range (430)–RSRQ-Type (430)–RS-SINR-Range (430)–RSSI-Range-r13 (431)–TimeToTrigger (431)–UL-DelayConfig (431)–WLAN-CarrierInfo (431)–WLAN-RSSI-Range (432)–WLAN-Status (432)6.3.6Other information elements (433)–AbsoluteTimeInfo (433)–AreaConfiguration (433)–C-RNTI (433)–DedicatedInfoCDMA2000 (434)–DedicatedInfoNAS (434)–FilterCoefficient (434)–LoggingDuration (434)–LoggingInterval (435)–MeasSubframePattern (435)–MMEC (435)–NeighCellConfig (435)–OtherConfig (436)–RAND-CDMA2000 (1xRTT) (437)–RAT-Type (437)–ResumeIdentity (437)–RRC-TransactionIdentifier (438)–S-TMSI (438)–TraceReference (438)–UE-CapabilityRAT-ContainerList (438)–UE-EUTRA-Capability (439)–UE-RadioPagingInfo (469)–UE-TimersAndConstants (469)–VisitedCellInfoList (470)–WLAN-OffloadConfig (470)6.3.7MBMS information elements (472)–MBMS-NotificationConfig (472)–MBMS-ServiceList (473)–MBSFN-AreaId (473)–MBSFN-AreaInfoList (473)–MBSFN-SubframeConfig (474)–PMCH-InfoList (475)6.3.7a SC-PTM information elements (476)–SC-MTCH-InfoList (476)–SCPTM-NeighbourCellList (478)6.3.8Sidelink information elements (478)–SL-CommConfig (478)–SL-CommResourcePool (479)–SL-CP-Len (480)–SL-DiscConfig (481)–SL-DiscResourcePool (483)–SL-DiscTxPowerInfo (485)–SL-GapConfig (485)。

2004年(秋)笔试试卷及答案解析

2004年(秋)笔试试卷及答案解析

Mayfly 2004 年(秋)笔试试卷参考答案及解析江苏省高等学校非计算机专业学生计算机基础知识和应用能力等级考试二级Visual Basic 语言程序设计2004 年(秋)笔试试卷(考试时间120 分钟,满分60 分)第一部分计算机基础知识(1)在下列有关不同进位制系统的叙述中,错误的是__________ 。

A )在计算机中所有的信息均以二进制编码存储B )任何进位制的整数均可精确地用其他任一进位制表示C)任何进位制的小数均可精确地用其他任一进位制表示D )十进制小数转换成二进制小数,可以采取“乘以2 取整”法(2 )在下列有关汉字编码字符集的叙述中,错误的是__________ 。

A )GB 2312-80 是我国颁布最早的汉字编码字符集标准,它包含6 000 多个汉字B )UCS-2 (unicode )编码标准中,西文字符采用单字节编码,汉字用双字节或四字节编码C)汉字扩展内码规范(GBK)保持与GB 23 12—80 字符集的汉字编码完全兼容D )BIG5 字符集是一种繁体汉字字符集,它包含10 000 多个汉字(3)在下列有关PC 机物理组成的叙述中,错误的是__________ 。

A )通常所说的主机空机箱,一般包含电源盒B )系统板也称为主板或大底板,一般包含BIOS 和CMOS 集成电路芯片C)系统板上的内存插槽一般只有一个,扩展内存只能通过更换内存条进行D )一块系统板上通常包含多种类型的I/O 接口(4 )为了使计算机有较高的性能/价格比,现代计算机均采用由多种存储器组成的层次式结构体系。

在下列存储器中,其存取周期一般为毫秒级的是__________ 。

A )Cache 存储器B )主存储器C )硬盘D )磁带(库)(5)1991 年Intel 公司提出的PCI 局部总线标准(工作频率为33MHz),因其高性能、低成本,目前仍广泛使用。

当数据线宽度为64 位时,其传输速率约为__________ 。

《2004亚洲CeBIT展后报告》中文

《2004亚洲CeBIT展后报告》中文

2004亚洲CeBIT(亚洲国际信息及通信技术展览会)展后报告目录1.0 2004亚洲CeBIT简介2.0 亚洲CeBIT综述第四届CeBIT Asia在上海举行2.12.2 国际以及亚洲的ICT公司商务贸易的场所3.0 亚洲CeBIT支持单位协会及组织单位3.1Asia媒体合作伙伴3.2CeBIT3.3 赞助商4.0 亚洲CeBIT亮点4.1 亚洲CeBIT信息与通信技术会议4.2 2004亚洲通信及信息市场管理层论坛4.3 2004中国电子政务与公众服务研讨会4.4 中德职业教育及资格培训论坛4.5 亚洲CeBIT网络银行技术论坛4.6 软件开发和架构会议4.7 未来技术展区-中德技术与研究展团4.8 iF中国设计大赛4.9 第一届中国技术标准产业化高峰论坛5.0 展商5.1 主要参展商5.2 参展商对展会的满意度调查6.0 观众6.1 观众构成6.2 观众的采购角色分析6.3 观众所担任的职位分类6.4 重要观众6.5 增值服务广泛邀请各商业领域的高层人士6.66.7 核心采购商项目7.0 媒体推广电视台7.1报刊杂志及网站媒体7.2国际媒体7.38.0 亚洲CeBIT主要活动8.1开幕仪式开幕晚宴8.28.3德国领馆招待会9.0 2005亚洲CeBIT预览10.0 展会图片1.0 2004亚洲CeBIT简介展会名称: 2004亚洲国际信息及通信技术展览会日期及时间: 4月26-29日上午9点至下午5点地点: 上海新国际博览中心浦东龙阳路2345号中国上海1号馆及2号馆展商: 来自18个国家的354家展商展商所属行业: 信息技术设备及系统电信无线及网络软件及服务人力资源自动数据采集安全技术及卡技术银行技术及金融服务研究及技术/未来技术展区观众: 来自48个国家/地区的51,252名观众及记者组织单位: 德国汉诺威展览公司MessegeländeGermany30521Hannover,电话: +49-511/8933113传真: +49-511/89 33140电子邮件: cebitasia@messe.de网址:汉诺威展览会(中国)有限公司浦东银霄路393号百安居浦东商务大厦301室中国上海电话: +86-21/50456700传真: +86-21/50459355电子邮件: cebit-asia@网址: 中国国际贸易促进委员会电子行业分会万寿路27号电子大厦2层中国北京电话: +86-10/68207163传真: +86-10/682006322.0 亚洲CeBIT综述2.1第四届亚洲CeBIT在上海举行2004亚洲CeBIT于4月26日至29日在上海新国际博览中心(SNIEC)隆重召开。

MISRA C 2004 规则中文版

MISRA C 2004 规则中文版
规则 9.3
规则 10.1
摘要
环境
环境
环境
环境 环境 语言扩展 语言扩展 语言扩展 语言扩展 文档 文档 文档 文档 文档 文档 字符集 字符集 标识符 标识符 标识符 标识符 标识符
标识符
标识符 类型 类型 类型 类型 类型 常量 常量 常量 常量 常量 常量 常量 常量 常量 常量 常量 常量 常量 初始化 初始化
控制流
控制流 控制流 控制流 控制流 控制流 控制流 控制流 Switch 语句 Switch 语句 Switch 语句 Switch 语句
规则 15.4 规则 15.5 规则 16.1 规则 16.2 规则 16.3 规则 16.4 规则 16.5 规则 16.6 规则 16.7 规则 16.8 规则 16.9 规则 16.10 规则 17.1 规则 17.2 规则 17.3 规则 17.4 规则 17.5 规则 17.6 规则 18.1 规则 18.2 规则 18.3 规则 18.4 规则 19.1 规则 19.2 规则 19.3
规则 13.1
规则 13.2
规则 13.3
规则 13.4
规则 13.5
规则 13.6
规则 13.7
规则 14.1 规则 14.2
规则 14.3
规则 14.4 规则 14.5 规则 14.6 规则 14.7 规则 14.8 规则 14.9 规则 14.10 规则 15.0 规则 15.1 规则型转换
规则 10.2
规则 10.3 规则 10.4
规则 10.5
规则 10.6 规则 11.1 规则 11.2 规则 11.3 规则 11.4 规则 11.5 规则 12.1 规则 12.2 规则 12.3 规则 12.4 规则 12.5

2004年4月全国计算机等级考试一级笔试试卷WINDOWS__[文档在线提供]

2004年4月全国计算机等级考试一级笔试试卷WINDOWS__[文档在线提供]

全国计算机等级考试一级资料2004年4月全国计算机等级考试一级笔试试卷WINDOWS(考试时间90分钟,满分100分)一、选择题( (1) ~ (30)每小题1分,(31) ~ (55)每小题2分,共80分)下列各题 A) 、B)、C)、D)四个选项中,只有一个选项是正确的,请将正确选项涂写在答题卡相应位置上,答在试卷上不得分。

•在微机的性能指标中,内存储器容量指的是A) ROM的容量 B) RAM的容量C) ROM和RAM容量的总和 D) CD-ROM的容量• 1GB等于A) 1000×1000字节B) 1000×1000×1000字节C) 3×1024字节D) 1024×1024×1024字节•在下列字符中,其 ASCII码值最大的一个是A) 8 B) 9 C) a D) b• CPU中控制器的功能是A) 进行逻辑运算 B) 进行算术运算C) 分析指令并发出相应的控制信号 D)只控制CPU的工作•计算机软件分为A) 程序与数据 B) 系统软件与应用软件C) 操作系统与语言处理程序 D) 程序、数据与文档•能将高级语言源程序转换成目标程序的是A) 编译程序 B) 解释程序 C) 调试程序 D) 编辑程序•在 Windows 98中,鼠标指针为沙漏如箭头表示A) 没有任务正在执行,所有任务都在等待B) 正在执行复制任务或打印任务C) 正在执行一项任务,不可执行其他任务D) 正在执行一项任务,但仍可执行其他任务•在 Windows 98中,为结束陷入死循环的程序,应首先按的键是A) Ctrl+Alt+Del B) Ctrl+Del C) Alt+Del D) Del• Windows 98的桌面是一个A) 系统文件夹 B) 用户文件 C) 系统文件 D) 用户文件夹•在 Windows 98中,用鼠标拖动非最大化窗口的标题栏可以A) 改变窗口的大小 B) 关闭窗口C) 移动窗口的位置 D) 恢复窗口•在Windows 98“我的电脑”窗口中,若要格式化已选中的磁盘,则首先选择的菜单是A) 文件 B) 编辑 C) 查看 D) 工具•在 Windows 98中,若要查找某文件,正确的方法是A) 选择“资源管理器”中的“文件”下拉菜单中的“查找”命令B) 选择“资源管理器”中的“编辑”下拉菜单中的“查找”命令C) 选择“资源管理器”中的“查看”下拉菜单中的“查找”命令D) 选择“资源管理器”中的“工具”下拉菜单中的“查找”命令•在 Windows 98的文件夹结构是一种A) 关系结构 B) 网状结构 C) 对象结构 D) 树状结构•双击“资源管理器”或“我的电脑”中某 Word名(或图标),将A) 启动Word程序,并自动建立一个名为“文档1”的新文档B) 启动Word程序,并打开此文档C) 在打印机上打印该文档D) 启动Word程序,但不建立新文档也不打开此文档•在普通视图下, Word文档的结束标记是一个A) 闪烁的粗竖线B) “I”形竖线C) 空心箭头 D) 一小段水平粗横线•在 Word 97编辑状态下,将选定的文本块用鼠标拖动到指定的位置进行文本块的复制时,应按住的控制键是A) Ctrl B) Shift C) Alt D) 回车•打开一篇较长的 Word 97文档后,直接编辑修改第25页的内容,应首先选择的操作是A) 单击“文件”→“编辑” B) 单击“插入”→“定位”C) 单击“编辑”→“定位” D) 单击“插入”→“编辑”•下面的叙述中错误的是A) “绘图”工具栏和“图片”工具栏没有区别,功能相同B) “绘图”工具栏和“图片”工具栏可同时显示在Word窗口上C) 可以在“视图” →“工具栏”选项中隐藏(或显示)“绘图”工具栏D) 可以在“视图” →“工具栏”选项中隐藏(或显示)“图片”工具栏•在Word 97编辑状态下,若要进行选定文本字符间距的设置,应选择的操作是A) 单击“编辑”→“格式” B) 单击“格式”→“段落”C) 单击“编辑”→“段落” D) 单击“格式”→“字体”•在 Word 97中显示和阅读文件最佳的视图方式是A) 普通视图 B) 联机版式视图 C) 页面视图 D) 大纲视图•在Word 97文档中创建项目符号时的A) 以段落为单位创建项目符号 B) 以选取中的文本为单位创建项目符号C) 以节为单位创建项目符号 D) 无所谓,可以任意创建项目符号•在 Word 97中,不能改变叠放次序的对象是A) 图片 B) 图形 C) 文本 D) 文本框•在Excel 97工作簿中,当前处于工作状态的工作表数是A) 1 B) 3 C) 255 D) 任意多个•在Excel 97工作表中,要向某单元格内作为数字输入“2003”,能正确输入的形式为A) ‘2003' B) ‘2003 C) =2003 D) e2003•在 Excel 97工作表中,A1和A2单元格的内容和选定的区域如下,将鼠标移至A2单元格右下角处,鼠标形状为实心“+”时,拖曳鼠标至A5单元格,此时A4单元格的内容为A) 8 B) 10 C) 18 D) 23•在 Excel 97工作表中,某单元格内有“ 1.37 ”为数值格式 1.37 ,如将其格式改为货币格式¥1.37 ,单击该单元格,则A) 单元格内和编辑栏内均显示数值格式B) 单元格内和编辑栏内均显示货币格式C) 单元格内显示数值格式,编辑栏内显示货币格式D) 单元格内显示货币格式,编辑栏内显示数值格式•在 Excel 97工作薄中,有Sheet1、Sheet2、Sheet3三个工作表,如图所示,连续选定该三个工作表,在Sheet1工作表的A1单元格内输入数值“9”,则Sheet2工作表和Sheet3工作表中A1单元格内A) 内容均为数值“0” B) 内容均为数值“9”C) 内容均为数值“10” D) 无数据•在PowerPoint 97的幻灯片浏览视图方式下,不能进行的操作是A) 更改个别幻灯片应用设计模板 B) 为个别幻灯片设计背景C) 删除个别幻灯片 D) 移动个别幻灯片的位置•关于电子邮件,下列说法中错误的是A) 发送电子邮件需要E_mail软件支持B) 发送电子邮件必须有自己的E_mail帐号C) 收件人必须有自己的邮政编码D) 必须知道收件人的E_mail地址•网络中使用的传输介质中,抗干扰性能最好的是A) 双绞线 B) 光缆 C) 细缆 D) 粗缆•用MIPS衡量的计算机性能指标是A) 安全性 B) 存储容量 C) 可靠性 D) 运算速度•下列说法中错误的是A) 简单地来说,指令就是给计算机下达的一道命令。

低密度校验码的研究

低密度校验码的研究

低密度校验码的研究(贵州大学明德学院05级通信工程贵州贵阳550003)中图分类号:tn文献标识码:a 文章编号:1007-0745(2008)11-00摘要: 低密度校验码(low density parity check codes,ldpc codes)是当前编码理论领域研究最热的信道编码之一。

本文介绍了ldpc 码的概念及其性能,并对低密度校验码应用的现状和今后方向作出了展望。

关键词: 低密度校验(ldpc) 码研究进展一、ldpc码简述低密度校验(ldpc)码又称为哥拉格(gallager)码,它是哥拉格于1962年提出的一种性能接近香农(shan2non) 限的好码。

在很长的一段时间里,ldpc码并未受到人们的重视。

直到1993 年,berrou 等提出了tur2bo码后,人们研究发现turbo 码其实就是一种ldpc 码,ldpc码又重新引起了人们的研究兴趣。

1996 年,mack2ay的研究,使ldpc码的研究跨入了一个新的阶段. 最近几年的研表明,在非规则图上构造的基于gf(q)域上的ldpc码性能要好于trubo 码,它的性能非常接近香农限。

ldpc码是根据稀疏随机图来构造的,因而它的码子之间具有很好的码距离。

ldpc码属于线性纠错码,它的校验矩阵是一个稀疏校验阵:每个码子满足一定数目的线性约束,而约束的数目通常是非常小的是约束数目为3 的校验矩阵)。

同时由于ldpc码的约束是由一个稀疏图定义的,因而使得它的译码变得较为容易。

目前,ldpc码已经成为编码领域的一个新的研究热点。

二、ldpc码的性能分析ldpc码的译码性能分析方法主要可以归纳为三类:1)密度进化(density evolution)理论。

2)高斯近似(gaussian approximation);3)exit 表(extrinsic information transform chart)。

1. 密度进化ldpc码的和积译码算法或bp算法中,信息在变量节点和校验节点之间不断迭代传递的,每次迭代传递的信息是随机变量。

2004自考英语作文

2004自考英语作文

2004自考英语作文English: In 2004, I believe technology has played a significant role in shaping our society and daily lives. The advancements in communication technology have brought people closer together, enabling instant communication across the globe. The rise of the internet has revolutionized the way we access information, connect with others, and even conduct business. Additionally, technological innovations in various industries have led to increased efficiency and productivity. However, with the rapid development of technology, there are also concerns about privacy, security, and the potential negative impact on jobs and the environment. It is crucial for us to embrace and leverage technology responsibly, while also being mindful of its consequences on society and the world as a whole.中文翻译: 在2004年,我相信技术在塑造我们的社会和日常生活方面发挥着重要作用。

2004年梅州市英语

2004年梅州市英语

2004年梅州市英语2004 Meizhou City EnglishIn the year 2004, the city of Meizhou in Guangdong Province, China, experienced a significant transformation in its approach to English education. This small city, nestled in the heart of the Hakka region, recognized the growing importance of English proficiency in the global arena and initiated a comprehensive plan to enhance the English language skills of its residents.The catalyst for this change was the realization that Meizhou's economic and social development was intrinsically linked to its ability to engage with the international community. With the rapid expansion of trade and commerce, the city's leaders understood that proficiency in English would be a crucial asset for its citizens, opening doors to new opportunities and forging stronger connections with the global market.To spearhead this initiative, the Meizhou municipal government allocated substantial resources towards improving the quality of English education in the city. They recognized that the foundation for this endeavor lay in the primary and secondary school systems,where the seeds of language learning are sown.One of the key strategies implemented was the recruitment and training of highly qualified English teachers. The city launched comprehensive professional development programs, providing these educators with the necessary skills and resources to deliver engaging and effective lessons. The government also offered attractive incentives to attract top-tier teaching talent from across the province, ensuring that Meizhou's classrooms were staffed with passionate and experienced language instructors.Alongside the investment in human resources, the city also prioritized the modernization of its English language curricula and teaching materials. The outdated textbooks and rote-learning methods were swiftly replaced with a more dynamic and communicative approach to language instruction. This shift emphasized the practical application of English, focusing on developing students' conversational abilities, critical thinking skills, and cultural awareness.To complement the classroom-based initiatives, Meizhou also introduced a range of extracurricular activities and community engagement programs. These included English language clubs, debate competitions, and cultural exchange events, all designed to create an immersive environment where students could practice theirlanguage skills in real-world settings.The impact of these efforts was quickly felt throughout the city. Students in Meizhou began to display a newfound enthusiasm for English, eagerly participating in language-learning activities and showcasing their talents in regional and national competitions. The city's performance in national English proficiency exams and assessments started to soar, and Meizhou's reputation as an emerging hub of English excellence began to spread across the country.Beyond the academic realm, the city's focus on English education also had a profound effect on its economic and social development. Local businesses reported an increased ability to engage with international partners, leading to a surge in cross-border trade and investment. Furthermore, the city's growing reputation as an English-proficient destination attracted a diverse array of foreign visitors, from tourists to professionals, further enriching Meizhou's cultural landscape.The success of Meizhou's English education initiative did not go unnoticed by neighboring cities and provinces. Other local governments in the region began to emulate Meizhou's model, recognizing the long-term benefits of investing in language education. This ripple effect contributed to the overall improvementof English proficiency across the Guangdong province, solidifying its position as a leader in language education within China.The story of Meizhou's English language transformation is a testament to the power of strategic vision, dedicated investment, and a community-wide commitment to education. By prioritizing the development of its citizens' English skills, the city has not only enhanced its competitiveness in the global marketplace but also fostered a more connected and culturally enriched society. As Meizhou continues to build on this foundation, its journey serves as an inspiring example for other cities aspiring to unlock the transformative potential of English language education.。

英语二2004 -回复

英语二2004 -回复

英语二2004 -回复how technology has transformed our daily lives.Introduction:Technology has become an integral part of our lives, shaping and transforming the way we live, work, and communicate. With the rapid advancements in technology, we have witnessed a substantial shift in the way we perform our daily activities. From the devices we use to the services we avail, technology has completely revolutionized our lives. In this article, we will delve into the ways technology has transformed our daily lives and examine the positive and negative impacts it has had on us.Body:1. Communication:One of the most significant impacts of technology on our daily lives is the way we communicate. In the past, communication was primarily limited to face-to-face interactions or handwritten letters that took days or even weeks to reach their destinations. However,with the advent of smartphones, email, and social media platforms, communication has become instantaneous and more convenient. Today, we can speak to someone across the world in real-time through video calls, send messages instantaneously, and stay connected with friends and family through various social media platforms. Technology has made communication faster, more accessible, and has brought people closer together.2. Healthcare:Another area where technology has had a transformative impact is healthcare. From the discovery of life-saving drugs to advanced surgical techniques, technology has revolutionized the healthcare industry. Medical devices such as CT scans, MRI machines, and robotic surgical tools have made diagnoses and treatments more accurate, efficient, and less invasive. Telemedicine has also gained significant popularity, allowing patients to consult with doctors remotely and receive timely medical advice. Technology has enhanced the quality of healthcare, improved patient outcomes, and saved countless lives.3. Education:The field of education has also undergone a remarkable transformation with the integration of technology. Traditional classrooms have been replaced by e-learning platforms, where students can access lectures, textbooks, and assignments online. Distance learning has become a viable option for individuals who cannot attend physical classrooms due to various reasons. With the help of technology, educational resources are easily accessible, and students can learn at their own pace, anywhere and anytime. Additionally, technology has introduced interactive learning tools, virtual reality simulations, and online collaboration platforms, making education more engaging and effective.4. Entertainment:Technology has had a profound impact on the entertainment industry as well. In the past, entertainment was confined to traditional mediums such as television, cinema, and live performances. However, with the advent of streaming services, video-sharing platforms, and social media, entertainment has become more personalized and accessible. People can now binge-watch their favorite TV shows, discover new music, andengage with content creators from around the world. The gaming industry has also been revolutionized by technology, providing immersive experiences through virtual reality and augmented reality. Technology has made entertainment more diverse, interactive, and readily available.5. Work and productivity:The way we work and perform our professional duties has been transformed by technology. The traditional workplace has extended beyond the boundaries of an office, with remote work becoming increasingly popular. With the help of technology, professionals can communicate, collaborate, and complete tasks from anywhere, resulting in increased productivity and flexibility. Automation and artificial intelligence have also streamlined various business processes, reducing errors and increasing efficiency. However, the reliance on technology has also raised concerns about job security and the potential for job displacement.Conclusion:In conclusion, technology has undoubtedly transformed our dailylives, bringing convenience, efficiency, and new opportunities. From communication to healthcare, education to entertainment, and work to leisure, technology has left an indelible mark on every aspect of our lives. While the impact of technology has largely been positive, it is crucial to acknowledge and address the challenges that arise from its rapid advancement. Striking a balance between embracing technology and preserving human connection and creativity is crucial as we navigate the ever-evolving technological landscape.。

适合行列合并译码算法的LDPC码的构造

适合行列合并译码算法的LDPC码的构造

适合行列合并译码算法的LDPC码的构造贺一峰;段哲民【摘要】针对低密度奇偶校验(LDPC)码译码器使用行列合并(RCJ)译码算法时存在的流水线冲突问题,提出了一种构造适合行列合并译码算法的LDPC码的方法.该构造方法在渐进添边(PEG)构造算法的基础上,加入行运算顺序的约束条件,使得利用该算法构造的LDPC码在行运算顺序上相邻两行内的非零块不同时共用一列,从而避免了硬件布局布线冲突,减少了流水线延时,提高了译码速率.仿真结果表明,用这种方法构造的LDPC码与全球微波互联接入(WiMAX)标准给出的LDPC码的译码性能相当,而且有效地减少了译码迭代次数,降低了硬件实现复杂度,提高了LDPC译码器吞吐率.【期刊名称】《高技术通讯》【年(卷),期】2015(025)007【总页数】8页(P677-684)【关键词】高速通信;LDPC码;行列合并译码算法;PEG构造算法;流水线冲突【作者】贺一峰;段哲民【作者单位】西北工业大学电子信息学院西安 710072;西北工业大学电子信息学院西安 710072【正文语种】中文低密度奇偶校验(low density parity check, LDPC)码[1]具有逼近香农极限的纠错性能和适合并行计算的简单译码算法[2],因而已被许多通信标准采纳,如第二代数字视频广播(digital video broadcasting-second generation, DVB-S2)标准[3]、全球微波互联接入(worldwide interoperability for microwave access, WiMAX)标准[4]等。

近年来已有不少研究人员研究了LDPC码的相关技术[5,6],但随着通信速率的提升,如何提高LDPC码译码器的吞吐率,则成了LDPC码的研究难点[7]。

LDPC码有多种译码算法,行列合并(row-column join, RCJ)译码算法[8]是较典型的一种,但该算法存在流水线冲突问题,从而影响了译码速率的提升。

IBM保密信息交换协议(中文) (83KB)

IBM保密信息交换协议(中文) (83KB)

本保密信息交换协议(“本协议”)由以下双方签订:[公司名称],为一家根据[中华人民共和国]法律成立并存在的公司,其注册地址为[ ];国际商业机器(中国)有限公司为一家根据中华人民共和国法律成立并存在的公司,其注册地址为上海市浦东新区张江高科技园区科苑路399号张江创新园10号楼7层。

鉴于:1、协议双方在开展业务合作的过程中需交换保密信息,及2、双方同意双方将在开展各自业务的同时,妥善保护双方交换的保密信息。

协议双方同意就协议一方("透露方”) 向另一方 (“接受方”) 提供的保密信息(“保密信息”)所应承担的保密义务达成如下协议:一、保密信息的提供透露方应以下述方式向接受方提供保密信息:1) 书面形式;2) 将载有保密信息的物质载体交付接受方;3) 对存储于数据库中的保密信息,透露方将向接受方传授开启及存储保密信息的方法;4) 口头说明或以视听方式向接受方展示。

透露方提供保密信息须注明“保密”,若透露方所提供的保密信息未注明“保密,或透露方是以口头方式提供,则透露方须在透露时明确说明所提供的信息是保密信息并于事后提供书面摘要。

二、接受方的保密义务1) 接受方对透露方提供的保密信息所采取的保密措施应与接受方对其自身拥有的保密信息所采取的保密措施相同;2) 接受方仅为透露保密信息的目的,或为透露方的利益使用保密信息。

接受方可将保密信息透露给:接受方内部有必要了解保密信息的雇员或其关联公司的雇员;经透露方事先书面同意的任何其他方。

在向上述任一方透露之前,接受方应与该方签订书面协议,以要求该方按本协议的规定对透露的保密信息保密。

如根据中国法律及法规的强制性规定,接受方必须披露保密信息,接受方可根据相关法律、法规的要求披露相关保密信息。

三、保密期限接受方根据本协议对保密信息应承担的保密义务自透露方提供之日起算为期二年。

四、接受方无责任事项接受方对下述信息无须承担保密义务:1) 在不承担保密责任的情况下获取的信息;2) 独立开发的信息;3) 在不违反保密义务的情况下,从透露方以外的渠道获取的信息;4) 不是由于接受方违反本协议而成为公开信息的信息;5) 透露方向无须承担保密责任的第三方泄漏的信息。

高一信息技术期中试卷带答案

高一信息技术期中试卷带答案

高一信息技术期中试卷带答案考试范围:xxx ;考试时间:xxx 分钟;出题人:xxx 姓名:___________班级:___________考号:___________1.答题前填写好自己的姓名、班级、考号等信息 2.请将答案正确填写在答题卡上一、选择题1.下列行为中,不属于信息加工范畴的是 A .收集 B .判别 C .分类 D .分析2.不属于信息的主要特征( )。

A .普遍性B .科学性C .依附性D .共享性3.某人通过网络,采用网络技术入侵公司电脑系统,获取该公司的机密数据。

这样的人被称之为( )A .网络播客B .网络黑客C .网络博客D .网络闪客4.用Windows 附件中的“录音机”程序录制了一段声音,默认的声音保存的格式是( )A.WAV B .DOC C .MP4 D .MP35.用搜索引擎搜索关键字“青奥会+中国”,搜索到的是 A .青奥会的官方网站 B .介绍中国的专业网站C .含有“青奥会”和“中国”这两个关键字的网页D .含有“青奥会”或者“中国”关键字的网页6.统一资源定位符(URL )依次表示的含义是( )。

A .①协议类型②目录名③Web 服务器的域名④文件名B .①协议类型②Web 服务器的域名③目录名④文件名C .①协议类型②Web 服务器的域名③文件名④目录名D.①Web服务器的域名②协议类型③目录名④文件名7.算法设计是编写程序的基础。

下列关于算法的叙述正确的是A.算法必须产生正确的结果B.算法可以没有输出C.算法必须具有确定性D.算法的表示必须使计算机能理解8.下列Flash工具中,与Photoshop中的“自由变换”具有相似功能的是( ) A. B. C. D.9.在正常输入汉字文稿中,出现了连续输入大写英文字母,而不能输入汉字的现象,最大可能是用户不小心按了一下()键。

A.Ctrl B.Caps Lock C.Enter D.Back space10.在Excel中,计算D2到F9矩形区域内所有单元格数据平均值的正确公式是A.="AVERAGE(D2" F9)B.=AVERAGE(D2,F9)C.=AVERAGE(D2:F9)D.=AVERAGE(D2:D9,F2:F9)二、判断题11.任何一个算法所包含的计算步骤都是有限的。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 11, NOVEMBER 20042657Extrinsic Information Transfer Functions: Model and Erasure Channel PropertiesAlexei Ashikhmin, Member, IEEE, Gerhard Kramer, Member, IEEE, and Stephan ten Brink, Member, IEEEAbstract—Extrinsic information transfer (EXIT) charts are a tool for predicting the convergence behavior of iterative processors for a variety of communication problems. A model is introduced that applies to decoding problems, including the iterative decoding of parallel concatenated (turbo) codes, serially concatenated codes, low-density parity-check (LDPC) codes, and repeat–accumulate (RA) codes. EXIT functions are defined using the model, and several properties of such functions are proved for erasure channels. One property expresses the area under an EXIT function in terms of a conditional entropy. A useful consequence of this result is that the design of capacity-approaching codes reduces to a curve-fitting problem for all the aforementioned codes. A second property relates the EXIT function of a code to its Helleseth–Kløve–Levenshtein information functions, and thereby to the support weights of its subcodes. The relation is via a refinement of information functions called split information functions, and via a refinement of support weights called split support weights. Split information functions are used to prove a third property that relates the EXIT function of a linear code to the EXIT function of its dual. Index Terms—Concatenated codes, duality, error-correction coding, iterative decoding, mutual information.I. INTRODUCTIONTHE seminal paper of Gallager [1, p. 48] suggested to evaluate the convergence behavior of iterative decoders for low-density parity-check (LDPC) codes by tracking the probability distributions of extrinsic log-likelihood ratios ( -values). The procedure is particularly simple for erasure channels (ECs) because one must compute only the fraction of erasures being passed from one component decoder to another. For example, this is done in [2], [3] for irregular LDPC codes. However, for other channels, one must track entire probability density functions. A detailed analysis for such cases is described in [4], [5], where the procedure is called density evolution. Density evolution can be simplified in several ways. First, empirical evidence shows that good EC codes are also good for many practical channels. This motivates designing codes for ECs, and then adapting the design for the actual channel [6,Manuscript received March 25, 2003; revised March 15, 2004. The material in this paper was presented in part at the Conference on Information Sciences and Systems, Princeton University, Princeton, NJ, March 2002; the IEEE International Symposium on Information Theory, Lausanne, Switzerland, June/July 2002; and the 3rd International Symposium on Turbo Codes, Brest, France, September 2003. A. Ashikhmin and G. Kramer are with Bell Laboratories, Lucent Technologies, Murray Hill, NJ 07974 USA (e-mail: aea@; gkr@). S. ten Brink was with Bell Laboratories, Lucent Technologies, Crawford Hill, NJ. He is now with Realtek, Irvine, CA 92618 USA (e-mail: stenbrink@ ). Communicated by S. Litsyn, Associate Editor for Coding Theory. Digital Object Identifier 10.1109/TIT.2004.836693Ch. 6]. A second approach is to track only one number per iteration rather than density functions. For instance, one might track a statistic of the extrinsic -values based on their mean, variance, an error probability, a fidelity or a mutual information [7]–[17]. We refer to [13, Sec. IV] and [18] for a comparison of some of these tools. We consider tracking a per-letter average mutual information, i.e., we use extrinsic information transfer (EXIT) charts. Several reasons for choosing EXIT charts are as follows. • Mutual information seems to be the most accurate statistic [13, Sec. IV], [18]. • Mutual information is the most robust statistic, in the sense that it applies without change to the widest range of channels, modulations, and detectors. For instance, EXIT functions apply to ECs without change. They further apply to symbol-based decoders [19] and to suboptimal decoders such as hard-decision decoders. • EXIT functions have analytic properties that have useful implications for designing codes and iterative processors. One aim of this paper is to justify the last claim. For example, we prove that if the decoder’s a priori -values come from a binary EC (or BEC) then the area under an EXIT function is one minus a conditional entropy. This property is used to show that code design for BECs reduces to a curve-fitting problem for several classes of codes including parallel concatenated (PC or turbo) [20], serially concatenated (SC) [21], LDPC, and repeat–accumulate (RA) codes [22], [23]. This fact gives theoretical support for the curve-fitting techniques already being applied in the communications literature, see, e.g., [24]–[30]. The success of these techniques relies on the robustness of EXIT charts: the transfer functions change little when BEC a priori -values are replaced by, e.g., a priori -values generated by transmitting binary phase-shift keying (BPSK) symbols over an additive white Gaussian noise (AWGN) channel. Moreover, the resulting transfer functions continue to predict the convergence behavior of iterative decoders rather accurately. For the special case of LDPC codes, the area property is related to the flatness condition of [31] and has similar implications. For both LDPC and RA codes on a BEC, the curve-fitting technique is known through a polynomial equation [2], [23]. However, the area property applies to many communication problems beyond LDPC or RA decoding. For instance, it applies to problems with PC codes, SC codes, modulators, detectors, and channels with memory. A second property we prove is that EXIT functions for BECs can be expressed in terms of what we call split information functions and split support weights. The former are refinements of the information functions of a code introduced in [32], while0018-9448/04$20.00 © 2004 IEEE2658IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 11, NOVEMBER 2004the latter are refinements of the weight enumerators of a code [33]–[35]. The split information functions are used to prove a third property that relates the EXIT function of a linear code to the EXIT function of its dual. As far as we know, these are the first applications of information functions and support weights to a posteriori probability (APP) decoding. This paper is organized as follows. The first part of the paper, comprising Sections II and III, deals with general channels. In Section II, we describe a decoding model that can be used for a wide variety of communication problems. In Section III, we use this model to define EXIT functions and derive general properties of such functions. The second part of the paper deals with BECs. In Section IV, we derive several properties of EXIT functions when the a priori -values are modeled as coming from a BEC. Sections V–VIII show how the area property guides code design. Section IX summarizes our results. II. PRELIMINARIES A. EXIT Chart Example Consider the EXIT chart for an LDPC code. Such a code is often represented by a bipartite graph whose left vertices are called variable nodes and whose right vertices are called check nodes (see [4]). Suppose the variable and check nodes have -regular degrees and , respectively, so that we have a and, as is often LDPC code. The code has a design rate of done, we assume the code is long and its interleaver has large girth. Suppose we transmit over a BEC with erasure probability . A belief-propagation decoder then passes only one of three proband (erasure). As we will show, the EXIT abilities: functions turn out to be one minus the fraction of erasures being passed from one side of the graph to the other, i.e., the analysis is equivalent to that of [2]. Fig. 1 shows the EXIT functions and . The curve for the check nodes is when the one starting at on the axis, and its functional form is . The curve for the variable nodes depends on and is given by . The decoding trajectories are depicted in Fig. 1 by the dashed , we begin lines marked with arrows. For instance, when axis at and move right to the check-node on the curve. We then move up to the variable-node curve marked , back to the check-node curve, and so forth. The curve does not intersect the check-node curve, which means the decoder’s per-edge erasure probability can be made to approach zero. We say that there is an open convergence tunnel between curve intersects the checkthe curves. In contrast, the node curve, which means the decoder gets “stuck.” Convergence , and is therefore called is, in fact, guaranteed if a threshold for this decoder. B. Decoding Model Consider the decoding model shown in Fig. 2. A binary-symmetric source produces a vector of independent information bits each taking on the values and with probability . An encoder maps to a binary length codeword . We write random variables using upper case letters and their realizationsFig. 1. EXIT chart for a (2; 4)-regular LDPC code on the BEC.Fig. 2.A decoding model for PC and SC codes.by the corresponding lower case letters. For example, we consider to be a realization of . The decoder receives two vectors: a noisy version of and a noisy version of , where is either or . We call the to channel the commuthe extrinsic nication channel, and the to channel channel. One might alternatively choose to call the extrinsic channel the a priori channel because we use its outputs as if they were a priori information. However, we will consider iterative decoding where this channel models extrinsic information [36] coming from another decoder rather than true a priori information. Either way, the terminology “extrinsic” reminds us that originates from outside the communication channel. that Fig. 2 depicts how we will model the information the component decoders of a PC or SC code receive. For example, suppose we perform iterative decoding for an SC code. The inner decoder receives extrinsic information about the input . The outer encoder, in bits of the inner encoder, so we set contrast, receives extrinsic information about the output bits of . In both cases, the extrinsic the outer encoder, so we set channel is an artificial device that does not exist. We introduce it only to help us analyze the decoder’s operation. Often both the communication and extrinsic channels are memoryless, but we remark that the area property derived below remains valid when the communication channel has memory. For example, suppose we parse the bits into 4-bit blocks, and map each of these blocks to a 16 quadrature amplitude modulation (16-QAM) symbol. We send these symbols through an AWGN channel and they arrive at the receiver as . We view the communication channel as including the parser,ASHIKHMIN et al.: EXTRINSIC INFORMATION TRANSFER FUNCTIONS2659Fig. 3.A decoding model with two encoders.of the bits in . The appropriate model is then Fig. 3 (or Fig. 2) and an extrinsic channel that is absent or completely with noisy. for the vector with the For further analysis, we write th entry removed, i.e., . We expand the numerator in (3) asthe 16-QAM mapper, and the AWGN channel. This channel has a 4-bit “block memory” but the area property applies. (Of course, for such channels the property’s applicability to iterative decoding is hampered by the fact that the extrinsic channels are not accurately modeled as BECs.) As a second example, suppose we map onto BPSK symbols that are sent over an intersymbol interference (ISI) channel. The communication channel now consists of the BPSK mapper and the ISI channel. We will write for the capacity of the communication channel. Fig. 3 depicts another decoding model with two encoders. In fact, Fig. 3 includes Fig. 2: let Encoder 1 be the Encoder in choose Encoder 2 to be the identity mapping, Fig. 2, and if choose Encoder 2 to be Encoder 1. The reason and if for introducing the second encoder is that, when dealing with LDPC or RA codes, we need to make Encoder 1 the identity mapping and Encoder 2 a repetition code or single parity-check code. This situation is not included in Fig. 2. and An even more general approach is to replace with a combined channel . Such a model could be useful for analyzing the effect of dependencies between the channel and a priori -values. For other problems, the vector might have complex entries and Encoder 1 might be a discrete-time linear filter. We will, however, consider only the model of Fig. 3. Let be the length of , , , and . The decoder uses and to compute two estimates of : the a posteriori -values and , gives the extrinsic -values . The symbol , a priori information about the random variable with -value (1) is the probability that conwhere . Similarly, for memoryless comditioned on the event munication channels, the symbol gives information about the with -value random variable (2) We will use (2) when dealing with PC codes in Section VIII. For simplicity, we assume that all random variables are discrete. Continuous random variables can be treated by replacing certain probabilities by probability density functions. The decoder we are mainly interested in is the APP decoder [1] that computes the -values (3) where is the probability of the event conditioned on and . For example, suppose we perform a maximum a posteriori probability (MAP) decoding(4) where and are vectors corresponding to , and where the last step follows if the extrinsic channel is memoryless. Expanding the denominator of (3) in the same way and inserting the result into (3), we have (5) where(6) The value is called the extrinsic -value about III. EXIT FUNCTIONS A. Average Extrinsic Information An iterative decoder has two or more component decoders that exchange extrinsic -values. Alternatively, the decoders could exchange extrinsic probabilities. The ensuing analysis does not depend on how the reliabilities are represented because we use mutual information. Continuing, the from one decoder pass through an interleaver and are fed to another decoder as a priori -values . We model as being output from a channel as in Fig. 3. We define two quantities (see also [13]–[16]), namely (7) (8) As done here, we adopt the notation of [37, Ch. 2] for mutual information and entropies. The value is called the average is called a priori information going into the decoder, and .2660IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 11, NOVEMBER 2004the average extrinsic information coming out of the decoder. as a function of . An EXIT chart plots all have the same disConsider first , and suppose the tribution, and that the extrinsic channel is memoryless and time invariant. We then have (9) We further have because is binary. We will usually consider codes for which the are uniform and identically can distributed, and codes and extrinsic channels for which take on all values between and . Consider next . Observe from (6) that is a function of , and that and are interchangeable since one and defines the other. This implies (see [38, Sec. 2.10]) (10) rather than simply because better We will use reminds us of the word a priori. Some authors prefer to add , and similarly for entropies commas and write with multiple random variables. However, we will adhere to the notation of [37]. The following proposition shows that the inequality in (10) is in fact an equality for APP decoders with extrinsic message passing. Proposition 1: (11) Proof: See Appendix A. We remark that for non-APP decoders, the average extrinsic information put out by the decoder will usually not satisfy (10) with equality. The import of Proposition 1 is that we need to consider only random variables in front of the decoder, i.e., we have (12) (14) B. Examples Example 1: (Repetition Codes on a BEC) Consider Fig. 2 with a length repetition code. Suppose the communication and extrinsic channels are BECs with erasure probabilities and , . Furthermore, respectively. We have we have for the case Similar curves can be computed for . We plot in Fig. 4 for with (it is the lowest solid curve). We , i.e., is approximately thus have the same as in Example 2. Observe that the BSC curve is close to but below the BEC curve. Similar observations concerning thresholds were made in [6, Chs. 6 and 7]. Example 3: (Repetition Code on an AWGN Channel) Consider the repetition codes of Example 1, but where the communication and extrinsic channels are BPSK-input AWGN chanand , respectively. We convert nels with noise variances these variances to the variances of their -values [36], namely, and , respectively. One can compute and , where is the binary entropy function. For the case we use (12) to compute and whereFig. 4. EXIT chart for repetition codes on BECs (upper three solid lines), a BSC (lower solid line), and BPSK on an AWGN channel (dashed line).extrinsic channels are binary-symmetric channels (BSCs) with crossover probabilities and , respectively. We now have(13) where the second step follows by the symmetry of the code. We versus in Fig. 4 where we have chosen and plot . Example 2: (Repetition Code on a BSC) Consider the repetition codes of Example 1, but where the communication and(15)ASHIKHMIN et al.: EXTRINSIC INFORMATION TRANSFER FUNCTIONS2661We plotin Fig. 4 for as the dashed curve, where so that . Observe that the AWGN curve lies between the BEC and BSC curves. Again, a similar result concerning thresholds was found in [6, Chs. 6 and 7]. In fact, recent work has shown that the BEC and BSC curves give upper and lower bounds, respectively, on the EXIT curves for repetition codes on binary-input, symmetric channels [39], [40].Example 7: (Irregular LDPC Codes) An irregular LDPC code [2] can be viewed as follows: Encoder 2 in Fig. 3 is a mixture of either repetition codes or single parity-check codes. For example, suppose that 40% and 60% of the edges are connected to degree- and degree- variables nodes, respectively. and , we have Inserting (16) into (19) with (20) are here the same as the left degree distribution coeffiThe of [2]. cients IV. ERASURE CHANNEL PROPERTIES The rest of this paper is concerned with the special case where the a priori symbols are modeled as coming from a BEC with erasure probability . We derive three results for EXIT functions for such situations. The first, an area property, is valid for any codes and communication channels. The second, an equation showing how to compute EXIT functions via the Helleseth–Kløve–Levenshtein information functions of a code [32], is valid when both the communication and extrinsic channels are BECs. The third, a duality property, relates the EXIT functions of a linear code and its dual. A. Area PropertyExample 4: Consider LDPC variable nodes of degree . We , and Encoder use the model of Fig. 3 where is one bit, 2 is a length repetition code. We again make the communication and extrinsic channels BECs with erasure probabilities and , respectively. We compute(16) Fig. 1 shows two examples of such curves when . andExample 5: Consider LDPC check nodes of degree . We and with Encoder 2 a length use the model of Fig. 3 with single parity-check code. Let the extrinsic channel be a BEC and (12) simplifies with erasure probability so that to (17) An example of such a curve with is plotted in Fig. 1.We have (21) where (22)Example 6: Consider Example 4 but where has bits single parity-check code. and Encoder 2 is a length is thus a systematic code. We The code with codewords compute(18) We will use (18) for generalized LDPC codes in Section VII-A. C. Mixtures of Codes Suppose we split into several vectors , , and encode each separately. Let and be those portions of the respective and corresponding to , and denote the length of by . Equation (8) simplifies toLet be the area under the EXIT function. We have the following result. Theorem 1: If the extrinsic channel (i.e., a priori channel) is a BEC, then for any codes (linear or not) and any communication channel (memoryless or not) we have (23) Proof: See Appendix B. Note that(19) which implies . We will consider prifor all so that . marily cases where For instance, suppose that Encoder 2 is linear and has no idle components, i.e., Encoder 2’s generator matrix has no all-zeros for all so that (23) becomes columns. This implies (24)and are the th entries of and , respectively, , and is the expression in square brackets in (19). is simply the average extrinsic information for Observe that is the average component code . Thus, the EXIT function of the component EXIT functions . This mixing property is known and was used in [24]–[28] to improve codes. where2662IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 11, NOVEMBER 2004TABLE I EXIT FUNCTIONS FOR SYSTEMATIC LINEAR BLOCK CODESFurthermore, if both Encoders 1 and 2 are one-to-one (invertible) mappings then we can interchange , , and . For example, we can write (24) as (25) An important consequence of Theorem 1 is that it restricts the form of the EXIT function. Moreover, one can sometimes relate to the code rate, as shown in several examples below. We remark that we will use two definitions of rate interand . In most cases, these changeably: two rates are identical, but if Encoder 2 is not a one-to-one mapping then the second rate is smaller than the first. We will . ignore this subtlety and assume that Example 8: (Scramblers) Suppose Encoder 1 in Fig. 3 is a filter or scrambler, i.e., it is a rate one code. Suppose further that Encoder 2 is the identity mapping and the communication channel is memoryless. We then have and so that (25) gives (26) The area is therefore if independent and uniformly distributed binary inputs maximize (26). This result was discovered in [41] and motivated Theorem 1. Example 9: (No Communication Channel) Suppose there is no communication channel. Such a situation occurs for the outer . The area decoder of an SC code for which we also have (24) is thus (27) Several EXIT functions for this situation are given in Table I, to mean the average extrinsic information where we write when . The functions are plotted in Fig. 5. We will show that (27) has important consequences for code design. Example 10: Consider Fig. 2 with . This situation fits the decoding of the inner code of an SC code (Section V) and the , component codes of a PC code (Section VIII). We have , and (28) Observe that, by definition, we have Example 11: Consider Fig. 2 with and (25) becomes . . We have (29) Let be a linear code and the dimension of mation function in positions of is . The infor(32)Fig. 5. EXIT chart for the systematic linear block codes of Table I.Example 12: Consider the LDPC variable nodes of Example , so (25) becomes 4. We have (30) Example 13: Consider the LDPC check nodes of Example 5. There is no communication channel, so we apply (27) with and to obtain (31) B. EXIT and Information Functions of a Code The information function in positions of a code was defined in [32] as the average amount of information in positions of . More precisely, let be the code length and be of size . Let with the set of all subsets of . We writeASHIKHMIN et al.: EXTRINSIC INFORMATION TRANSFER FUNCTIONS2663We write the unnormalized version ofas (33)so that in (36) we have if else. , (39)We remark that the above definitions and the following theory can be extended to nonlinear codes (cf. [32]). Consider the following simple generalization of . Let be in Fig. 3. Suppose Encoders the code formed by all pairs code (which 1 and 2 are linear, and that is a linear means that has dimension ). Let be the set of all subsets of the form of whereThe resulting EXIT curve coomputed from (36) is (13). Example 15: (No Communication Channel) Suppose (see Example 9), in which case we have(40) Example 16: (MAP Decoding) Recall from Section II-B that MAP decoding of the bits in corresponds to Fig. 2 with , i.e., there is no a priori information. We have and (41) Note that the decoder’s average erasure probability is simply . For instance, suppose we transmit using an maximum distance separable (MDS) code [42, Ch. 11]. Any positions of such a code have rank for , and rank for . This implies if if and if if Inserting (42) and (43) into (41), we obtain (44) We point out that only few binary MDS codes exist. However, most of the theory developed above can be extended to -ary sources and codes. For example, suppose is a -ary vector, Reed–Solomon code over GF , and Encoder 1 is an . Reed–Solomon codes are MDS and the average symbol erasure probability turns out to be precisely (44). C. EXIT Functions and Support Weights The information functions of a code are known to be related to the support weights of its subcodes [32]. The support weight of a code is the number of positions where not all codewords of are zero. For example, the code (45) . (43) (42)In other words, is the set of subsets of positions from the first positions of , and positions from the last positions positions of . We define the split information function in of as (34) We write the unnormalized version of as (35) We remark that is the information function of Encoder 1, is the information function of Encoder 2. and The following theorem shows that EXIT functions on a BEC can be computed from the split information functions. We write for the average extrinsic information when and when there is no communication channel, and and . Theorem 2: If the extrinsic and communication channels are BECs with respective erasure probabilities and , and if Encoders 1 and 2 are linear with no idle components, then we have(36) Proof: See Appendix C. Theorem 2 can be used to prove Theorem 1 for BEC communication channels: integrating (36) with (108), we have(37) Example 14: (Repetition Codes) Consider the repetition codes of Example 1. We compute if else (38)has . The th support weight of is the number of unique subspaces of of dimension and support weight . For example, the code (45) has(46)2664IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 11, NOVEMBER 2004The sequence is the usual weight disfor , and we tribution of a code. We also have for . write The numbers have been investigated in [34], [35], and more recently in [43]–[48]. For instance, it is known that can as follows (see [32, Theorem 5]): be written in terms of the(47) where for all we define we write and , and forThe numbers are known as Gaussian binomial coefficients [42, p. 443]. The have been determined for some codes. For simplex code has (see [32, Sec. IV]) instance, the if else. for (48)Fig. 6.EXIT chart for the [7; 3] simplex code and its dual.For example, forwe haveInserting (48) into (47), and performing manipulations, we have (see [32, Sec. IV]) (49) and , , ,(54) . In fact, we easily compute (55) for general . This shows that it can be simpler to compute directly rather than through (47). D. Split Support Weights motivates The fact that can be expressed in terms of the can be written in terms of appropriate the question whether generalizations of the . This is indeed possible, as we proceed to show. Consider again the linear code formed by all pairs in Fig. 3. We define the split support weights of as the number of unique subspaces of that have dimension , support weight in the first positions of , and support weight in the last positions of . We have the following generalization of (47). Theorem 3:) The simplex Example 17: (Simplex Code with code is a single parity-check code. Equation (49) yields(50) Inserting (50) into (40), we have Example 18: (Simplex Code with code has ) The . simplex(51) Inserting (51) into (40), we have (52) where where . This curve is plotted in Fig. 6 as the solid line, .Example 19: (Uncoded Transmission) Consider the uncoded transmission of bits. We use [35, eq. (7)] to compute (53)(56) Proof: See Appendix D for a sketch of the proof.。

相关文档
最新文档