1981
DOI: 10.1109/tcom.1981.1094886
|View full text |Cite
|
Sign up to set email alerts
|

Gray Code Generation for MPSK Signals

Abstract: Presented here are techniques for generating desired gray codes with properties different from those of the standard binary reflected gray code. For communications using phase shift-keyed (PSK) signals with different significances for different phases, it is desirable to have such codes with different bit error probabilities. For some applications, it is important to have codes with arbitrary crossover Hamming distances. These techniques are suitable for generating codes with either or both of these properties… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2002
2002
2021
2021

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(24 citation statements)
references
References 3 publications
0
24
0
Order By: Relevance
“…Combining gcd(n, 30) = 1 and n ≡ 4 (mod 9), we get that n ≡ 13,31,49,67 (mod 90) is sufficient to prove the claim. We note that the conditions described in Lemma 18 are not the only cases in which gcd(n, N ′ (n)/3) = 1, but are just the ones easy to derive.…”
Section: Lemma 18mentioning
confidence: 78%
“…Combining gcd(n, 30) = 1 and n ≡ 4 (mod 9), we get that n ≡ 13,31,49,67 (mod 90) is sufficient to prove the claim. We note that the conditions described in Lemma 18 are not the only cases in which gcd(n, N ′ (n)/3) = 1, but are just the ones easy to derive.…”
Section: Lemma 18mentioning
confidence: 78%
“…The base case is the list s(0) = 0, s(1) = 1 for m = 1. BRGC was first designed to speed up telegraphy by Frank Gray [17], but now has numerous applications including databases, experimental design, and puzzle solving [15,16,22,23,26]. The term Gray code more generally refers to an exhaustive listing of combinatorial objects.…”
Section: Loopless Generation Of 2-way Binary-reflected Gray Codesmentioning
confidence: 99%
“…Some of them are mentioned here as follows. However, more can be learned through the references pro vided as in the references (Sundberg, 1975;Ludman, 1981;Er, 1984, andProskurowski andRuskey, 1985; _____________________________________ *Corresponding author's e-mail: afaq@squ.edu.om Lee, 1986;Conway, et al 1989;Skiena, 1990;Press, et al 1992;Etzion and Peterson, 1992;Hiltgen, et al 1996;Savage, 1997;Ruskey, 1997;Guan andDah-Jyu, 1998, Moshe andTuvi, 1999;Black Paul 2004;Alan and Alessandro Mei, 2004;Jywe-Fei and Lai, 2005;Bitner, et al 2005).…”
Section: Introductionmentioning
confidence: 99%
“…Since the Gray code has enormous applications as mentioned above has many facet researches as is evident in surveying the literature (Gray, 1953;Sundberg, 1975;Ludman, 1981;Lee, 1986;Conway, et al 1989;Skiena, 1990;Press, et al 1992;Etzion Peterson, 1992;Hiltgen, et al 1996;Savage, 1997;Ruskey, 1997;Guan Dah-Jyu, 1998, Moshe andTuvi, 1999;Black Paul 2004;Alan and Alessandro Mei, 2004;Jywe-Fei and Lai, 2005;Bitner, et al 1976;Er, 1984;Proskurowski and Ruskey, 1985;Ruskey, 1993;Dominique, 2000;Lassing, et al 2003, Goddyn and Gvozdjak 2003and Vajnovszki and Walsh 2006. It is clear through the literature survey that there had been much discovered and written about the Gray code; it is associated with many elegant circuits and algorithms.…”
Section: Introductionmentioning
confidence: 99%