New Inequalities for q-ary Constant-Weight Codes
|
|
- Sheryl Greer
- 5 years ago
- Views:
Transcription
1 New Inequalities for q-ary Constant-Weight Codes Hyun Kwang Kim 1 Phan Thanh Toan 1 1 Department of Mathematics, POSTECH International Workshop on Coding and Cryptography April 15-19, 2013, Bergen (Norway
2 Outline 1 Results on binary codes Binary codes A fundamental problem in coding theory Delsarte s linear programming bound for binary codes New upper bounds for binary constant-weight codes 2 q-ary codes Delsarte s linear programming bound for q-ary codes New inequalities for q-ary constant-weight codes New upper bounds for q-ary constant-weight codes
3 Binary codes What is a code? Binary code Let F = {0, 1}. A subset C of F n is called a (binary code of length n. An element of a code C is called a codeword. Minimum distance of a code Hamming distance between two vectors u, v F n, denoted by d(u, v, is the number of coordinates where they differ. Minimum distance of a code C is defined by min{d(u, v u, v C, u v}.
4 A fundamental problem in coding theory A fundamental problem in coding theory Definition Given n and d, define A(n, d = maximum number of codewords in any code of length n and minimum distance d. Remarks Determining the exact values of A(n, d is an extremely difficult problem (for large n. Since A(n, d = A(n + 1, d + 1 if d is odd, we can always assume that d is even. When d is even, all values of A(n, d are known for n 16. For an unknown A(n, d, one may try to find its lower and upper bound.
5 Delsarte s linear programming bound for binary codes Delsarte s linear programming bound Distance distribution of a code Let C be a code of length n. The distance distribution {A i } n i=0 of C is defined by A i = 1 C {(u, v C2 d(u, v = i} for i = 0, 1,..., n. Remark By definition, A 0 = 1 and n i=0 A i = C. Delsarte s linear programming bound For upper bounds on A(n, d, Delsarte s linear programming bound is a powerful bound. Delsarte s linear programming bound is based on the fact that the following linear combinations of the distance distribution {A i } n i=0 are nonnegative (as follows.
6 Delsarte s linear programming bound for binary codes Delsarte s linear programming bound Theorem (Delsarte Let C be a code with distance distribution {A i } n i=0. For k = 1, 2,..., n, n P k (n; ia i 0, where P k (n; x is the Krawtchouk polynomial given by i=0 P k (n; x = k ( ( 1 j x j j=0 ( n x. k j
7 Delsarte s linear programming bound for binary codes Delsarte s linear programming bound Theorem (Delsarte s linear programming bound A(n, d 1 + max(a 1 + A A n, where the maximization is taken over all (A 1, A 2,..., A n satisfying A i 0 for i = 1, 2,..., n and satisfying the above linear constraints. Remark If d is even, then A(n, d is attained by a code with all vectors having even weights. Hence, if d is even, then we can put A i = 0 if i is odd. Also, by definition, A i = 0 if 0 < i < d.
8 Delsarte s linear programming bound for binary codes Delsarte s linear programming bound Theorem (Delsarte s linear programming bound and its improvements Let C be a code with distance distribution {A i } n i=0. For k = 1, 2,..., n, n P k (n; ia i 0. i=0 If M = C is odd, then n P k (n; ia i 1 M i=0 ( n k. If M = C 2 (mod 4, then there exists t {0, 1,..., n} such that n P k (n; ia i 2 [( n ] + P k (n; t. M k i=0
9 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Result 1 We prove simultaneously Delsarte s linear programming bound and its well known improvements. The proof is based on counting the number of 2 k submatrices of C, where C is considered as a C n matrix (each codeword in C is a row. Definition For each k = 1, 2,..., n, we introduce polynomials k ( ( x n x k P k (n; x = and P + k j k j (n; x = j=0 j odd j=0 j even ( x j ( n x. k j Remark It follows that P + k (n; x + P k (n; x = ( n k. The polynomial P k (n; x := P + k (n; x P k (n; x is called the Krawtchouk polynomial.
10 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices The proof immediately follows from the following lemma. Lemma Let C be a code with size M and distance distribution {A i } n i=0 and let t be the number of columns of C containing an odd number of ones. For each k = 1, 2,..., n, n P k (n; ia i 2 M i=1 [ ( n ] N δp + k (n; t k (1 and n i=1 ( P + n k (n; ia i (M [ ( n ] N δp + k (n; t, (2 k M k where{ N and δ are given by M 2 if M is even N = 4 M 2 1 if M is odd 4 and δ = { 1 if M 2 (mod 4 0 otherwise.
11 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Proof of Lemma Write C = (c mi, 1 m C, 1 i n. Let S 1 (k be the number of 2 k matrices ( cmi1 c A = mi2 c mik c li1 c li2 c lik such that m l, i 1 < i 2 < < i k, and A contains an odd number of 1 s. The entries of A are on the intersection of two rows and k columns of C.
12 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Proof of Lemma (continued For an ordered pair (u, v of different rows of C, to get such a matrix A choose j coordinates (j odd where u and v are differ and choose k j coordinates where u and v are the same.
13 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Proof of Lemma (continued Hence, an ordered pair (u, v will contribute n j=0 j odd ( ( d(u, v n d(u, v = P k (n; d(u, v j k j to S 1 (k. Therefore, S 1 (k = = u,v C u v n i=1 = M P k P k (n; d(u, v = n (n; i u,v C d(u,v=i n P k (n; ia i. i=1 1 i=1 u,v C d(u,v=i P k (n; i
14 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Proof of Lemma (continued Let u 1, u 2,..., u n be the n columns of C. For k columns u i 1, u i 2,..., u i k, to get such a matrix A choose one row such that the intersection of this row with the k columns has an odd number of 1 s and choose another row such that the intersection of that row with the k columns has an even number of 1 s.
15 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Proof of Lemma (continued Hence, S 1 (k = 2 i 1 <i 2 < <i k wt(u i u i k [M wt(u i u i k ]. If M is odd, then δ = 0 by definition. For all i 1 < i 2 < < i k, wt(u i 1 + +u i k [M wt(u i 1 + +u i k ] M 1 M + 1 = M2 1 = N So ( n S 1 (k 2 N = 2N k i 1 <i 2 < <i k [ ( n ] = 2 N δp + k (n; t. k Therefore, (1 is proved if M is odd.
16 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Proof of Lemma (continued If M 0 (mod 4, then δ = 0 by definition. For all i 1 < i 2 < < i k, wt(u i u i k [M wt(u i u i k ] M 2 M 2 = M2 4 = N. So ( n [ ( n ] S 1 (k 2N = 2 N δp + k (n; t. k k Therefore, (1 is proved if M 0 (mod 4.
17 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Proof of Lemma (continued If M 2 (mod 4, then δ = 1 by definition. Let I be the collection of coordinates i such that the column u i contains an odd number of 1 s. If {i 1, i 2,..., i k } I is odd, then wt(u i u i k [M wt(u i u i k ] M 2 However, if {i 1, i 2,..., i k } I is even, then wt(u i u i k [M wt(u i u i k ] M 2 2 S 1 (k 2 [ = 2 N {i 1,i 2,...,i k } I odd ( n k δp + k (n; t Hence, (1 is proved if M 2 (mod 4. N + ]. M 2 = M2 4 = N. M {i 1,i 2,...,i k } I even = N 1. N 1
18 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Proof of Lemma (continued For (2, one can count (two times of the number of 2 k submatrices A such that A contains an even number of 1 s or just use the equality n P (n; ia i + i=1 n i=1 ( P + n (n; ia i = (M 1. k
19 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Theorem (Delsarte s linear programming bound and its improvements Let C be a code with distance distribution {A i } n i=0. For k = 1, 2,..., n, n ( n P k (n; ia i. k i=1 i=1 If M = C is odd, then n ( n P k (n; ia i + 1 ( n. k M k If M = C 2 (mod 4, then there exists t {0, 1,..., n} such that n ( n P k (n; ia i + 2 [( n ] + P k (n; t. k M k i=1 Proof of Theorem Take sum of inequalities (1 and (2 in the above lemma.
20 New upper bounds for binary constant-weight codes Upper bounds for A(n, d, w Definition Given n, d, and w, define A(n, d, w = maximum number of codewords in any code of length n and minimum distance d such that each codeword has exactly w ones.
21 New upper bounds for binary constant-weight codes Counting the number of 1 k submatrices Proposition (1-row k-column formula Let C be a code of length n and constant-weight w. For each k = 1, 2,..., n, wt(u i u i k = MP k (n; w, i 1 < <i k where the sum is taken over all (i 1, i 2,..., i k such that i 1 < i 2 < < i k. Sketch of proof Count the number of 1 k submatrices of C containing an odd number of 1 s.
22 New upper bounds for binary constant-weight codes Counting the number of 2 k submatrices Result 2 (2-row k-column formula Let C be a code of length n and constant-weight w. For each k = 1, 2,..., n, and w P k (n; 2iA 2i 2 M i=d/2 w P + k (n; 2iA 2i 2 M i=d/2 [(( n k r k q k (M q k +r k (q k + 1(M q k 1] [(( n k r k q k (M q k ( n +r k (q k + 1(M q k 1] (M 1, k where q k and r k are the quotient and the remainder, respectively, when dividing MP k (n; w by ( n k, i.e., MP k (n; w = q ( n k k + rk, with 0 r k < ( n k.
23 New upper bounds for binary constant-weight codes New upper bounds on A(n, d, w Sketch of proof Count (two times of the number of 2 k submatrices of C containing an odd (even number of 1 s. Result 2 gives the following new upper bounds for A(n, d, w, n 28. A(18, 6, (428 A(18, 6, (425 A(20, 6, (1421 A(27, 6, (66079 A(27, 6, (84574 A(27, 6, (91080 A(28, 6, ( A(28, 6, ( A(28, 6, (169740
24 New upper bounds for binary constant-weight codes New upper bounds on A(n, d, w New upper bounds A(24, 10, (171 A(24, 10, (223 A(24, 10, (247 A(26, 10, (214 A(27, 10, (299 A(28, 10, (2629 A(26, 12, (48 A(27, 12, (140 A(27, 12, (156 A(28, 12, (149 A(28, 12, (199 A(28, 12, (245 A(28, 12, (265
25 q-ary codes q-ary codes Results 1 and 2 appeared in [B. G. Kang, H. K. Kim, and P. T. Toan, Delsarte s linear programming bound for constant-weight codes," IEEE Trans. Inf. Theory, vol. 58, no. 9, pp , Sep. 2012]. In the remaining, we generalize Results 1 and 2 to q-ary codes.
26 q-ary codes Definition Definition Let F q be a finite field with q elements. A subset C of F n q is called a q-ary code of length n. Definition Given n and d, define A q(n, d = maximum number of codewords in any q-ary code of length n and minimum distance d. Definition Given n, d, and w, define A q(n, d, w = maximum number of codewords in any q-ary code of length n and minimum distance d such that each codeword has weight w.
27 Delsarte s linear programming bound for q-ary codes Delsarte s linear programming bound for q-ary codes Result 3 We prove simultaneously Delsarte s linear programming bound and its well known improvements for q-ary codes. Theorem (Delsarte s linear programming bound and its improvements Let C be a q-ary code with distance distribution {A i } n i=0. Let M = C. For k = 1, 2,..., n, n i=0 P k (n; ia i 1 ( M r(q r(q n 1k 1, k where r is the remainder when dividing M by q and P k (n; x = k ( ( ( 1 j (q 1 k j i n i j k j j=0 is the Krawtchouk polynomial.
28 Delsarte s linear programming bound for q-ary codes Delsarte s linear programming bound for q-ary codes Idea of proof Write C = (c mi, 1 m C, 1 i n. Consider all 2 k matrices ( cmi1 c A = mi2 c mik c li1 c li2 c lik such that m l, i 1 < i 2 < < i k and all vectors where F q = F q \ {0}. α = (α 1, α 2,..., α k (F q k, Count the number of pairs (A, α such that α 1 c mi1 + + α k c mik α 1 c li1 + + α k c lik.
29 New inequalities for q-ary constant-weight codes Inequalities for q-ary constant-weight codes Result 4 Using the same idea in the proof, we get the following new inequalities for q-ary constant-weight codes. Theorem Suppose that {A i } n i=0 is the distance distribution of a q-ary constant-weight code C of length n and constant-weight w. Let M = C. Then for each k = 1, 2,..., n, n i=1 ( P k (n; ia i (M 1(q 1 k n 2q k (q 1M T (k, where T (k = T 1 (k + T 2 (k + T 3 (k.
30 New inequalities for q-ary constant-weight codes Inequalities for q-ary constant-weight codes Notations [ T 1 (k = T 2 (k = (q 1 k ( n k [ (q 1 k ( n k r k ] (M q k q k + r k (M q k 1(q k + 1, ] [( q 1 t k r k sk 2 2 +(q 1 t k t k s k (s k [( q 1 t T 3 (k = r k k s k 2 + (q 1 t kt ks k(s k where ( tk (s k ], 2 ( t k 2 (s k ], q k and r k are the quotient and the remainder, respectively, when dividing 2(q 1M P q k (n; w by (q ( 1k n k, s k and t k are the quotient and the remainder, respectively, when dividing q k by (q 1, s k and t k are the quotient and the remainder, respectively, when dividing q k + 1 by (q 1.
31 New inequalities for q-ary constant-weight codes Inequalities for q-ary constant-weight codes Notations For each k = 1, 2,..., n, P k (n; x = 1 2 k ( [(q 1 j ( 1 j ](q 1 k j x j j=0 ( n x k j (3 and ( P + k (n; x = (q 1 k n P k (n; x. (4 k
32 New inequalities for q-ary constant-weight codes Inequalities for q-ary constant-weight codes For k = 1, the new inequalities give the following corollary, which was shown by P. R. J. Östergård and M. Svanström in [Ternary constant weight codes, Electron. J. Combin., vol. 9, no. 1, 2002]. Corollary If there exists a q-ary code of length n, constant-weight w, and minimum distance d, then where q 2 M(M 1d 2t q 1 i=0 j=i+1 q 2 M i M j + 2(n t q 1 i=0 j=i+1 M i M j, (5 k and t are the quotient and the remainder, respectively, when dividing Mw by n, M 0 = M k 1, M 0 = M k, M i = (k + i/(q 1, and = (k + i 1/(q 1. M i
33 New upper bounds for q-ary constant-weight codes New upper bounds for q-ary constant-weight codes Example Suppose that q = 3 and (n, d, w = (9, 3, 7. The best known upper bound for A 3 (9, 3, 7 is A 3 (9, 3, Suppose that A 3 (9, 3, 7 = 576. Let C be a code whose size attains the upper bound and let {A i } n i=0 be the distance distribution of C. The above theorem gives the following inequalities. 9A 3 + 6A 4 + 3A 5 3A 7 6A 8 9A A 3 + 6A 4 6A 5 9A 6 3A A A A 3 24A 4 18A 5 + 6A A 7 84A A 3 39A A A 6 21A 7 42A A A A A 5 36A 6 21A A 8 126A A A 4 48A 5 15A A 7 84A A A 3 48A 4 24A A 6 57A A 8 36A A A 5 36A A 7 15A 8 + 9A A A 4 16A 5 + 8A 6 4A 7 + 2A 8 A /3
34 New upper bounds for q-ary constant-weight codes New upper bounds for q-ary constant-weight codes Example (continued Since A 0 = 1 and A 1 = A 2 = 0, A i = i=3 9 A i = C = 576. i=0 Consider the following linear programming (where the A i are considered as variables ( 9 max 1 + A i subject to A i 0, i = 3, 4,..., 9 and subject to the above inequalities. Solving this linear programming, we get the maximum value of i=3 A i is 12094/21, which is less than 576. This contradiction shows that such a code C does not exist. Therefore, i=3 A 3 (9, 3,
35 Thank you!
Hypercube Coloring and the Structure of Binary Codes
Hypercube Coloring and the Structure of Binary Codes by James Gregory Rix A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE in The College of Graduate Studies
More informationOn equidistant constant weight codes
Discrete Applied Mathematics 128 (2003) 157 164 www.elsevier.com/locate/dam On equidistant constant weight codes Fang-Wei Fu a;1, Torleiv KlHve b; ;2, Yuan Luo c, Victor K. Wei b a Temasek Laboratories,
More informationImproved Upper Bounds on Sizes of Codes
880 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 4, APRIL 2002 Improved Upper Bounds on Sizes of Codes Beniamin Mounits, Tuvi Etzion, Senior Member, IEEE, and Simon Litsyn, Senior Member, IEEE
More informationORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES
ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES ANDRIES E. BROUWER, ARJEH M. COHEN, MAN V.M. NGUYEN Abstract. All mixed (or asymmetric) orthogonal arrays of strength 3 with run size at most 64 are
More informationThe Hamming Codes and Delsarte s Linear Programming Bound
The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the
More informationDelsarte s linear programming bound
15-859 Coding Theory, Fall 14 December 5, 2014 Introduction For all n, q, and d, Delsarte s linear program establishes a series of linear constraints that every code in F n q with distance d must satisfy.
More informationThe Structure of Z 2 Z 2 s-additive Codes: Bounds on the Minimum Distance
Appl Math Inf Sci 7, No 6, 2271-2278 (2013) 2271 Applied Mathematics & Information Sciences An International Journal http://dxdoiorg/1012785/amis/070617 The Structure of Z 2 Z 2 s-additive Codes: Bounds
More informationFRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES
FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES ANDRIES E. BROUWER, ARJEH M. COHEN, MAN V.M. NGUYEN Abstract. All mixed (or asymmetric) orthogonal arrays of strength 3 with run size at most
More informationDivision of Trinomials by Pentanomials and Orthogonal Arrays
Division of Trinomials by Pentanomials and Orthogonal Arrays School of Mathematics and Statistics Carleton University daniel@math.carleton.ca Joint work with M. Dewar, L. Moura, B. Stevens and Q. Wang
More informationA Questionable Distance-Regular Graph
A Questionable Distance-Regular Graph Rebecca Ross Abstract In this paper, we introduce distance-regular graphs and develop the intersection algebra for these graphs which is based upon its intersection
More informationarxiv: v2 [math.co] 17 May 2017
New nonbinary code bounds based on divisibility arguments Sven Polak 1 arxiv:1606.05144v [math.co] 17 May 017 Abstract. For q, n, d N, let A q (n, d) be the maximum size of a code C [q] n with minimum
More informationSolutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16
Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the
More informationChapter 2. Error Correcting Codes. 2.1 Basic Notions
Chapter 2 Error Correcting Codes The identification number schemes we discussed in the previous chapter give us the ability to determine if an error has been made in recording or transmitting information.
More information11 Minimal Distance and the Parity Check Matrix
MATH32031: Coding Theory Part 12: Hamming Codes 11 Minimal Distance and the Parity Check Matrix Theorem 23 (Distance Theorem for Linear Codes) Let C be an [n, k] F q -code with parity check matrix H. Then
More informationType I Codes over GF(4)
Type I Codes over GF(4) Hyun Kwang Kim San 31, Hyoja Dong Department of Mathematics Pohang University of Science and Technology Pohang, 790-784, Korea e-mail: hkkim@postech.ac.kr Dae Kyu Kim School of
More informationRANK AND PERIMETER PRESERVER OF RANK-1 MATRICES OVER MAX ALGEBRA
Discussiones Mathematicae General Algebra and Applications 23 (2003 ) 125 137 RANK AND PERIMETER PRESERVER OF RANK-1 MATRICES OVER MAX ALGEBRA Seok-Zun Song and Kyung-Tae Kang Department of Mathematics,
More informationExtended 1-perfect additive codes
Extended 1-perfect additive codes J.Borges, K.T.Phelps, J.Rifà 7/05/2002 Abstract A binary extended 1-perfect code of length n + 1 = 2 t is additive if it is a subgroup of Z α 2 Zβ 4. The punctured code
More informationWe saw in the last chapter that the linear Hamming codes are nontrivial perfect codes.
Chapter 5 Golay Codes Lecture 16, March 10, 2011 We saw in the last chapter that the linear Hamming codes are nontrivial perfect codes. Question. Are there any other nontrivial perfect codes? Answer. Yes,
More informationON LINEAR CODES WHOSE WEIGHTS AND LENGTH HAVE A COMMON DIVISOR. 1. Introduction
ON LINEAR CODES WHOSE WEIGHTS AND LENGTH HAVE A COMMON DIVISOR SIMEON BALL, AART BLOKHUIS, ANDRÁS GÁCS, PETER SZIKLAI, AND ZSUZSA WEINER Abstract. In this paper we prove that a set of points (in a projective
More informationOrthogonal Arrays & Codes
Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible
More informationA Short Overview of Orthogonal Arrays
A Short Overview of Orthogonal Arrays John Stufken Department of Statistics University of Georgia Isaac Newton Institute September 5, 2011 John Stufken (University of Georgia) Orthogonal Arrays September
More informationGalois geometries contributing to coding theory
Ghent University Dept. of Pure Mathematics and Computer Algebra Krijgslaan 281 - S22 9000 Ghent Belgium Thurnau, April 15, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 EXTENDABILITY RESULTS
More informationOn non-antipodal binary completely regular codes
On non-antipodal binary completely regular codes J. Borges, J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, 08193-Bellaterra, Spain. V.A. Zinoviev Institute
More informationArrangements, matroids and codes
Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde
More informationNew binary self-dual codes of lengths 50 to 60
Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) New binary self-dual codes of lengths 50 to 60 Nikolay Yankov Moon Ho Lee Received: date / Accepted: date Abstract Using
More informationCan You Hear Me Now?
Can You Hear Me Now? An Introduction to Coding Theory William J. Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 19 October 2004 W. J. Turner (Wabash College)
More informationLecture 17: Perfect Codes and Gilbert-Varshamov Bound
Lecture 17: Perfect Codes and Gilbert-Varshamov Bound Maximality of Hamming code Lemma Let C be a code with distance 3, then: C 2n n + 1 Codes that meet this bound: Perfect codes Hamming code is a perfect
More informationBinary Convolutional Codes of High Rate Øyvind Ytrehus
Binary Convolutional Codes of High Rate Øyvind Ytrehus Abstract The function N(r; ; d free ), defined as the maximum n such that there exists a binary convolutional code of block length n, dimension n
More informationCodes and Designs in the Grassmann Scheme
Codes and Designs in the Grassmann Scheme Tuvi Etzion Computer Science Department Technion -Israel Institute of Technology etzion@cs.technion.ac.il ALGEBRAIC COMBINATORICS AND APPLICATIONS ALCOMA10, Thurnau,
More informationLower Bounds for q-ary Codes with Large Covering Radius
Lower Bounds for q-ary Codes with Large Covering Radius Wolfgang Haas Immanuel Halupczok Jan-Christoph Schlage-Puchta Albert-Ludwigs-Universität Mathematisches Institut Eckerstr. 1 79104 Freiburg, Germany
More informationExtended Binary Linear Codes from Legendre Sequences
Extended Binary Linear Codes from Legendre Sequences T. Aaron Gulliver and Matthew G. Parker Abstract A construction based on Legendre sequences is presented for a doubly-extended binary linear code of
More informationPartial permutation decoding for binary linear Hadamard codes
Partial permutation decoding for binary linear Hadamard codes R. D. Barrolleta 1 and M. Villanueva 2 Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona Cerdanyola
More informationLecture 19: Elias-Bassalygo Bound
Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecturer: Atri Rudra Lecture 19: Elias-Bassalygo Bound October 10, 2007 Scribe: Michael Pfetsch & Atri Rudra In the last lecture,
More information7.1 Definitions and Generator Polynomials
Chapter 7 Cyclic Codes Lecture 21, March 29, 2011 7.1 Definitions and Generator Polynomials Cyclic codes are an important class of linear codes for which the encoding and decoding can be efficiently implemented
More information: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane
2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and
More informationCOUNTING NUMERICAL SEMIGROUPS BY GENUS AND SOME CASES OF A QUESTION OF WILF
COUNTING NUMERICAL SEMIGROUPS BY GENUS AND SOME CASES OF A QUESTION OF WILF NATHAN KAPLAN Abstract. The genus of a numerical semigroup is the size of its complement. In this paper we will prove some results
More informationProduct of P-polynomial association schemes
Product of P-polynomial association schemes Ziqing Xiang Shanghai Jiao Tong University Nov 19, 2013 1 / 20 P-polynomial association scheme Definition 1 P-polynomial association scheme A = (X, {A i } 0
More informationGalois geometries contributing to coding theory
Ghent University Dept. of Mathematics Krijgslaan 281 - S22 9000 Ghent Belgium Opatija, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 COVERING RADIUS AND SATURATING SETS 4 LINEAR MDS CODES
More informationExtending MDS Codes. T. L. Alderson
Extending MDS Codes T. L. Alderson Abstract A q-ary (n,k)-mds code, linear or not, satisfies n q + k 1. A code meeting this bound is said to have maximum length. Using purely combinatorial methods we show
More informationEcon 204 Supplement to Section 3.6 Diagonalization and Quadratic Forms. 1 Diagonalization and Change of Basis
Econ 204 Supplement to Section 3.6 Diagonalization and Quadratic Forms De La Fuente notes that, if an n n matrix has n distinct eigenvalues, it can be diagonalized. In this supplement, we will provide
More informationOutline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials
Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields
More informationConstruction X for quantum error-correcting codes
Simon Fraser University Burnaby, BC, Canada joint work with Vijaykumar Singh International Workshop on Coding and Cryptography WCC 2013 Bergen, Norway 15 April 2013 Overview Construction X is known from
More informationClassical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems
Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive
More informationOn the Griesmer bound for nonlinear codes
On the Griesmer bound for nonlinear codes Emanuele Bellini, Alessio Meneghetti To cite this version: Emanuele Bellini, Alessio Meneghetti. On the Griesmer bound for nonlinear codes. Pascale Charpin, Nicolas
More informationFormally self-dual additive codes over F 4
Formally self-dual additive codes over F Sunghyu Han School of Liberal Arts, Korea University of Technology and Education, Cheonan 0-708, South Korea Jon-Lark Kim Department of Mathematics, University
More informationMATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q
MATH-315201 This question paper consists of 6 printed pages, each of which is identified by the reference MATH-3152 Only approved basic scientific calculators may be used. c UNIVERSITY OF LEEDS Examination
More informationOn sets without tangents and exterior sets of a conic
On sets without tangents and exterior sets of a conic Geertrui Van de Voorde Abstract A set without tangents in PG(2, q) is a set of points S such that no line meets S in exactly one point. An exterior
More informationOn Computing the Hamming Distance
Acta Cybernetica 16 (2004) 443 449. On Computing the Hamming Distance Gerzson Kéri and Ákos Kisvölcsey Abstract Methods for the fast computation of Hamming distance developed for the case of large number
More informationHamming Codes 11/17/04
Hamming Codes 11/17/04 History In the late 1940 s Richard Hamming recognized that the further evolution of computers required greater reliability, in particular the ability to not only detect errors, but
More informationCirculant Hadamard matrices as HFP-codes of type C 4n C 2. arxiv: v1 [math.co] 26 Nov 2017
Circulant Hadamard matrices as HFP-codes of type C 4n C 2. arxiv:1711.09373v1 [math.co] 26 Nov 2017 J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona October
More informationSome results on cross-correlation distribution between a p-ary m-sequence and its decimated sequences
Some results on cross-correlation distribution between a p-ary m-sequence and its decimated sequences A joint work with Chunlei Li, Xiangyong Zeng, and Tor Helleseth Selmer Center, University of Bergen
More informationEfficient Decoding of Permutation Codes Obtained from Distance Preserving Maps
2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical
More informationError control codes for parallel asymmetric channels
Error control codes for parallel asymmetric channels R. Ahlswede and H. Aydinian Department of Mathematics University of Bielefeld POB 100131 D-33501 Bielefeld, Germany E-mail addresses: ahlswede@mathematik.uni-bielefeld.de
More informationDISTANCE COLORINGS OF HYPERCUBES FROM Z 2 Z 4 -LINEAR CODES
DISTANCE COLORINGS OF HYPERCUBES FROM Z 2 Z 4 -LINEAR CODES GRETCHEN L. MATTHEWS Abstract. In this paper, we give distance-` colorings of the hypercube using nonlinear binary codes which are images of
More information3. Coding theory 3.1. Basic concepts
3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,
More informationA Characterization Of Quantum Codes And Constructions
A Characterization Of Quantum Codes And Constructions Chaoping Xing Department of Mathematics, National University of Singapore Singapore 117543, Republic of Singapore (email: matxcp@nus.edu.sg) Abstract
More informationCodewords of small weight in the (dual) code of points and k-spaces of P G(n, q)
Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q) M. Lavrauw L. Storme G. Van de Voorde October 4, 2007 Abstract In this paper, we study the p-ary linear code C k (n, q),
More informationInternational Mathematical Forum, Vol. 6, 2011, no. 4, Manjusri Basu
International Mathematical Forum, Vol 6, 011, no 4, 185-191 Square Designs on New Binary ( 3n 1, 3 n ) Codes Manjusri Basu Department of Mathematics University of Kalyani Kalyani, WB, India, Pin-74135
More informationWeek 15-16: Combinatorial Design
Week 15-16: Combinatorial Design May 8, 2017 A combinatorial design, or simply a design, is an arrangement of the objects of a set into subsets satisfying certain prescribed properties. The area of combinatorial
More informationOptimal XOR based (2,n)-Visual Cryptography Schemes
Optimal XOR based (2,n)-Visual Cryptography Schemes Feng Liu and ChuanKun Wu State Key Laboratory Of Information Security, Institute of Software Chinese Academy of Sciences, Beijing 0090, China Email:
More informationOn Linear Subspace Codes Closed under Intersection
On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F
More informationQuantum LDPC Codes Derived from Combinatorial Objects and Latin Squares
Codes Derived from Combinatorial Objects and s Salah A. Aly & Latin salah at cs.tamu.edu PhD Candidate Department of Computer Science Texas A&M University November 11, 2007 Motivation for Computers computers
More informationProperties of the Integers
Properties of the Integers The set of all integers is the set and the subset of Z given by Z = {, 5, 4, 3, 2, 1, 0, 1, 2, 3, 4, 5, }, N = {0, 1, 2, 3, 4, }, is the set of nonnegative integers (also called
More informationA characterization of graphs by codes from their incidence matrices
A characterization of graphs by codes from their incidence matrices Peter Dankelmann Department of Mathematics University of Johannesburg P.O. Box 54 Auckland Park 006, South Africa Jennifer D. Key pdankelmann@uj.ac.za
More informationa + b = b + a and a b = b a. (a + b) + c = a + (b + c) and (a b) c = a (b c). a (b + c) = a b + a c and (a + b) c = a c + b c.
Properties of the Integers The set of all integers is the set and the subset of Z given by Z = {, 5, 4, 3, 2, 1, 0, 1, 2, 3, 4, 5, }, N = {0, 1, 2, 3, 4, }, is the set of nonnegative integers (also called
More informationVisual Cryptography Schemes with Optimal Pixel Expansion
Visual Cryptography Schemes with Optimal Pixel Expansion Carlo Blundo, Stelvio Cimato and Alfredo De Santis Dipartimento di Informatica ed Applicazioni Università degli Studi di Salerno, 808, Baronissi
More information4. Algebra and Duality
4-1 Algebra and Duality P. Parrilo and S. Lall, CDC 2003 2003.12.07.01 4. Algebra and Duality Example: non-convex polynomial optimization Weak duality and duality gap The dual is not intrinsic The cone
More informationNORTHWESTERN UNIVERSITY Thrusday, Oct 6th, 2011 ANSWERS FALL 2011 NU PUTNAM SELECTION TEST
Problem A1. Let a 1, a 2,..., a n be n not necessarily distinct integers. exist a subset of these numbers whose sum is divisible by n. Prove that there - Answer: Consider the numbers s 1 = a 1, s 2 = a
More informationSOME DESIGNS AND CODES FROM L 2 (q) Communicated by Alireza Abdollahi
Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 3 No. 1 (2014), pp. 15-28. c 2014 University of Isfahan www.combinatorics.ir www.ui.ac.ir SOME DESIGNS AND CODES FROM
More informationInvertible Matrices over Idempotent Semirings
Chamchuri Journal of Mathematics Volume 1(2009) Number 2, 55 61 http://www.math.sc.chula.ac.th/cjm Invertible Matrices over Idempotent Semirings W. Mora, A. Wasanawichit and Y. Kemprasit Received 28 Sep
More informationIndex Coding With Erroneous Side Information
Index Coding With Erroneous Side Information Jae-Won Kim and Jong-Seon No, Fellow, IEEE 1 Abstract arxiv:1703.09361v1 [cs.it] 28 Mar 2017 In this paper, new index coding problems are studied, where each
More informationarxiv: v4 [cs.it] 14 May 2013
arxiv:1006.1694v4 [cs.it] 14 May 2013 PURE ASYMMETRIC QUANTUM MDS CODES FROM CSS CONSTRUCTION: A COMPLETE CHARACTERIZATION MARTIANUS FREDERIC EZERMAN Centre for Quantum Technologies, National University
More informationHadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights
Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Qichun Wang Abstract It is known that correlation-immune (CI) Boolean functions used
More informationSteiner triple and quadruple systems of low 2-rank
Steiner triple and quadruple systems of low 2-rank Vladimir D. Tonchev Department of Mathematical Sciences Michigan Technological University Houghton, MI 49931, USA tonchev@mtu.edu, www.math.mtu.edu/ tonchev
More informationTC08 / 6. Hadamard codes SX
TC8 / 6. Hadamard codes 3.2.7 SX Hadamard matrices Hadamard matrices. Paley s construction of Hadamard matrices Hadamard codes. Decoding Hadamard codes A Hadamard matrix of order is a matrix of type whose
More informationVisual cryptography schemes with optimal pixel expansion
Theoretical Computer Science 369 (2006) 69 82 wwwelseviercom/locate/tcs Visual cryptography schemes with optimal pixel expansion Carlo Blundo a,, Stelvio Cimato b, Alfredo De Santis a a Dipartimento di
More informationLIFTED CODES OVER FINITE CHAIN RINGS
Math. J. Okayama Univ. 53 (2011), 39 53 LIFTED CODES OVER FINITE CHAIN RINGS Steven T. Dougherty, Hongwei Liu and Young Ho Park Abstract. In this paper, we study lifted codes over finite chain rings. We
More informationIncidence Structures Related to Difference Sets and Their Applications
aòµ 05B30 ü èµ Æ Òµ 113350 Æ Æ Ø Ø K8: 'u8'é(9ùa^ = Ø K8: Incidence Structures Related to Difference Sets and Their Applications úôœææ Æ Ø ž
More information1 2 3 style total. Circle the correct answer; no explanation is required. Each problem in this section counts 5 points.
1 2 3 style total Math 415 Examination 3 Please print your name: Answer Key 1 True/false Circle the correct answer; no explanation is required. Each problem in this section counts 5 points. 1. The rings
More informationLecture Introduction. 2 Linear codes. CS CTT Current Topics in Theoretical CS Oct 4, 2012
CS 59000 CTT Current Topics in Theoretical CS Oct 4, 01 Lecturer: Elena Grigorescu Lecture 14 Scribe: Selvakumaran Vadivelmurugan 1 Introduction We introduced error-correcting codes and linear codes in
More informationLinear Codes, Target Function Classes, and Network Computing Capacity
Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:
More informationexercise in the previous class (1)
exercise in the previous class () Consider an odd parity check code C whose codewords are (x,, x k, p) with p = x + +x k +. Is C a linear code? No. x =, x 2 =x =...=x k = p =, and... is a codeword x 2
More informationarxiv: v2 [cs.it] 25 Jul 2010
On Optimal Anticodes over Permutations with the Infinity Norm Itzhak Tamo arxiv:1004.1938v [cs.it] 5 Jul 010 Abstract Department of Electrical and Computer Engineering, Ben-Gurion University, Israel Moshe
More informationIN [1] Kiermaier and Zwanzger construct the extended dualized Kerdock codes ˆK
New upper bounds on binary linear codes and a Z 4 -code with a better-than-linear Gray image Michael Kiermaier, Alfred Wassermann, and Johannes Zwanzger 1 arxiv:1503.03394v2 [cs.it] 16 Mar 2016 Abstract
More informationGeneralized hyper-bent functions over GF(p)
Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G
More informationZero-sum square matrices
Zero-sum square matrices Paul Balister Yair Caro Cecil Rousseau Raphael Yuster Abstract Let A be a matrix over the integers, and let p be a positive integer. A submatrix B of A is zero-sum mod p if the
More informationarxiv: v1 [cs.dm] 20 Jul 2009
New Binomial Bent Function over the Finite Fields of Odd Characteristic Tor Helleseth and Alexander Kholosha arxiv:0907.3348v1 [cs.dm] 0 Jul 009 The Selmer Center Department of Informatics, University
More informationUNIT MEMORY CONVOLUTIONAL CODES WITH MAXIMUM DISTANCE
UNIT MEMORY CONVOLUTIONAL CODES WITH MAXIMUM DISTANCE ROXANA SMARANDACHE Abstract. Unit memory codes and in particular, partial unit memory codes are reviewed. Conditions for the optimality of partial
More informationMATH32031: Coding Theory Part 15: Summary
MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,
More informationMATH3302. Coding and Cryptography. Coding Theory
MATH3302 Coding and Cryptography Coding Theory 2010 Contents 1 Introduction to coding theory 2 1.1 Introduction.......................................... 2 1.2 Basic definitions and assumptions..............................
More informationThe Distribution of Generalized Sum-of-Digits Functions in Residue Classes
Journal of umber Theory 79, 9426 (999) Article ID jnth.999.2424, available online at httpwww.idealibrary.com on The Distribution of Generalized Sum-of-Digits Functions in Residue Classes Abigail Hoit Department
More information642:550, Summer 2004, Supplement 6 The Perron-Frobenius Theorem. Summer 2004
642:550, Summer 2004, Supplement 6 The Perron-Frobenius Theorem. Summer 2004 Introduction Square matrices whose entries are all nonnegative have special properties. This was mentioned briefly in Section
More informationMULTI-RESTRAINED STIRLING NUMBERS
MULTI-RESTRAINED STIRLING NUMBERS JI YOUNG CHOI DEPARTMENT OF MATHEMATICS SHIPPENSBURG UNIVERSITY SHIPPENSBURG, PA 17257, U.S.A. Abstract. Given positive integers n, k, and m, the (n, k)-th m- restrained
More informationThe Witt designs, Golay codes and Mathieu groups
The Witt designs, Golay codes and Mathieu groups 1 The Golay codes Let V be a vector space over F q with fixed basis e 1,..., e n. A code C is a subset of V. A linear code is a subspace of V. The vector
More informationApril 25 May 6, 2016, Verona, Italy. GAME THEORY and APPLICATIONS Mikhail Ivanov Krastanov
April 25 May 6, 2016, Verona, Italy GAME THEORY and APPLICATIONS Mikhail Ivanov Krastanov Games in normal form There are given n-players. The set of all strategies (possible actions) of the i-th player
More informationSome Nordhaus-Gaddum-type Results
Some Nordhaus-Gaddum-type Results Wayne Goddard Department of Mathematics Massachusetts Institute of Technology Cambridge, USA Michael A. Henning Department of Mathematics University of Natal Pietermaritzburg,
More informationGroups of Prime Power Order with Derived Subgroup of Prime Order
Journal of Algebra 219, 625 657 (1999) Article ID jabr.1998.7909, available online at http://www.idealibrary.com on Groups of Prime Power Order with Derived Subgroup of Prime Order Simon R. Blackburn*
More informationNon-Interactive Zero Knowledge (II)
Non-Interactive Zero Knowledge (II) CS 601.442/642 Modern Cryptography Fall 2017 S 601.442/642 Modern CryptographyNon-Interactive Zero Knowledge (II) Fall 2017 1 / 18 NIZKs for NP: Roadmap Last-time: Transformation
More informationProblems for Putnam Training
Problems for Putnam Training 1 Number theory Problem 1.1. Prove that for each positive integer n, the number is not prime. 10 1010n + 10 10n + 10 n 1 Problem 1.2. Show that for any positive integer n,
More informationP = 1 F m(p ) = IP = P I = f(i) = QI = IQ = 1 F m(p ) = Q, so we are done.
Section 1.6: Invertible Matrices One can show (exercise) that the composition of finitely many invertible functions is invertible. As a result, we have the following: Theorem 6.1: Any admissible row operation
More information