243:
53:. This has the same effect as encoding with an error-correction code with a higher rate, or less redundancy. However, with puncturing the same decoder can be used regardless of how many bits have been punctured, thus puncturing considerably increases the flexibility of the system without significantly increasing its complexity.
57:
109:(RRC) Connection set procedure, during sending NBAP radio link setup message the uplink puncturing limit will send to NODE B, along with U/L spreading factor & U/L scrambling code.
214:
64:
In some cases, a pre-defined pattern of puncturing is used in an encoder. Then, the inverse operation, known as depuncturing, is implemented by the decoder.
284:
224:
308:
50:
277:
88:
219:. Wiley Series in Discrete Mathematics and Optimization. Vol. 48 (Third ed.). John Wiley & Sons.
303:
270:
106:
92:
31:
250:
220:
99:
254:
191:
129:
113:
17:
117:
196:
179:
297:
38:
242:
150:
210:
46:
163:
Solomom, G.; Stiffler, J. J. (1964). "Punctured
Systematic Cyclic Codes".
84:
72:
80:
76:
68:
56:
151:"Radio Access Networks for UMTS: Principles and Practice"
258:
71:
during the rate matching process. It is also used in
216:
Introduction to the Theory of Error-Correcting Codes
60:Short illustration of the puncturing procedure.
278:
8:
285:
271:
178:Solomon, G.; Stiffler, J.J. (April 1965).
195:
55:
142:
45:is the process of removing some of the
180:"Algebraically punctured cyclic codes"
7:
239:
237:
257:. You can help Knowledge (XXG) by
98:Puncturing is often used with the
25:
132:, an upper bound in coding theory
241:
1:
197:10.1016/S0019-9958(65)90080-X
112:Puncturing was introduced by
325:
236:
29:
18:Puncturing (coding theory)
309:Telecommunications stubs
249:This article related to
30:Not to be confused with
184:Information and Control
49:after encoding with an
27:Signal coding technique
165:IEEE Convention Record
107:Radio Resource Control
67:Puncturing is used in
61:
59:
51:error-correction code
32:Puncturing (topology)
91:, as well as in the
102:in coding systems.
251:telecommunications
62:
266:
265:
100:Viterbi algorithm
16:(Redirected from
316:
287:
280:
273:
245:
238:
230:
202:
201:
199:
175:
169:
168:
160:
154:
147:
21:
324:
323:
319:
318:
317:
315:
314:
313:
294:
293:
292:
291:
234:
227:
209:
206:
205:
177:
176:
172:
167:. Vol. 12.
162:
161:
157:
149:Chris Johnson.
148:
144:
139:
130:Singleton bound
126:
114:Gustave Solomon
35:
28:
23:
22:
15:
12:
11:
5:
322:
320:
312:
311:
306:
296:
295:
290:
289:
282:
275:
267:
264:
263:
246:
232:
231:
226:978-1118030998
225:
204:
203:
170:
155:
141:
140:
138:
135:
134:
133:
125:
122:
118:J. J. Stiffler
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
321:
310:
307:
305:
304:Coding theory
302:
301:
299:
288:
283:
281:
276:
274:
269:
268:
262:
260:
256:
252:
247:
244:
240:
235:
228:
222:
218:
217:
212:
208:
207:
198:
193:
190:(2): 170–79.
189:
185:
181:
174:
171:
166:
159:
156:
152:
146:
143:
136:
131:
128:
127:
123:
121:
119:
115:
110:
108:
103:
101:
96:
94:
90:
86:
82:
78:
74:
70:
65:
58:
54:
52:
48:
44:
40:
39:coding theory
33:
19:
259:expanding it
248:
233:
215:
187:
183:
173:
164:
158:
145:
111:
104:
97:
66:
63:
42:
36:
211:Pless, Vera
95:Standards.
47:parity bits
298:Categories
137:References
75:, Wi-SUN,
43:puncturing
120:in 1964.
213:(2011).
124:See also
153:. 2011.
105:During
223:
253:is a
85:DVB-T
73:Wi-Fi
255:stub
221:ISBN
116:and
87:and
81:EDGE
77:GPRS
69:UMTS
192:doi
93:DRM
89:DAB
37:In
300::
186:.
182:.
83:,
79:,
41:,
286:e
279:t
272:v
261:.
229:.
200:.
194::
188:8
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.