New Inequalities for q-ary Constant-Weight Codes

Size: px
Start display at page:

Download "New Inequalities for q-ary Constant-Weight Codes"

Transcription

1 New Inequalities for q-ary Constant-Weight Codes Hyun Kwang Kim 1 Phan Thanh Toan 1 1 Department of Mathematics, POSTECH International Workshop on Coding and Cryptography April 15-19, 2013, Bergen (Norway

2 Outline 1 Results on binary codes Binary codes A fundamental problem in coding theory Delsarte s linear programming bound for binary codes New upper bounds for binary constant-weight codes 2 q-ary codes Delsarte s linear programming bound for q-ary codes New inequalities for q-ary constant-weight codes New upper bounds for q-ary constant-weight codes

3 Binary codes What is a code? Binary code Let F = {0, 1}. A subset C of F n is called a (binary code of length n. An element of a code C is called a codeword. Minimum distance of a code Hamming distance between two vectors u, v F n, denoted by d(u, v, is the number of coordinates where they differ. Minimum distance of a code C is defined by min{d(u, v u, v C, u v}.

4 A fundamental problem in coding theory A fundamental problem in coding theory Definition Given n and d, define A(n, d = maximum number of codewords in any code of length n and minimum distance d. Remarks Determining the exact values of A(n, d is an extremely difficult problem (for large n. Since A(n, d = A(n + 1, d + 1 if d is odd, we can always assume that d is even. When d is even, all values of A(n, d are known for n 16. For an unknown A(n, d, one may try to find its lower and upper bound.

5 Delsarte s linear programming bound for binary codes Delsarte s linear programming bound Distance distribution of a code Let C be a code of length n. The distance distribution {A i } n i=0 of C is defined by A i = 1 C {(u, v C2 d(u, v = i} for i = 0, 1,..., n. Remark By definition, A 0 = 1 and n i=0 A i = C. Delsarte s linear programming bound For upper bounds on A(n, d, Delsarte s linear programming bound is a powerful bound. Delsarte s linear programming bound is based on the fact that the following linear combinations of the distance distribution {A i } n i=0 are nonnegative (as follows.

6 Delsarte s linear programming bound for binary codes Delsarte s linear programming bound Theorem (Delsarte Let C be a code with distance distribution {A i } n i=0. For k = 1, 2,..., n, n P k (n; ia i 0, where P k (n; x is the Krawtchouk polynomial given by i=0 P k (n; x = k ( ( 1 j x j j=0 ( n x. k j

7 Delsarte s linear programming bound for binary codes Delsarte s linear programming bound Theorem (Delsarte s linear programming bound A(n, d 1 + max(a 1 + A A n, where the maximization is taken over all (A 1, A 2,..., A n satisfying A i 0 for i = 1, 2,..., n and satisfying the above linear constraints. Remark If d is even, then A(n, d is attained by a code with all vectors having even weights. Hence, if d is even, then we can put A i = 0 if i is odd. Also, by definition, A i = 0 if 0 < i < d.

8 Delsarte s linear programming bound for binary codes Delsarte s linear programming bound Theorem (Delsarte s linear programming bound and its improvements Let C be a code with distance distribution {A i } n i=0. For k = 1, 2,..., n, n P k (n; ia i 0. i=0 If M = C is odd, then n P k (n; ia i 1 M i=0 ( n k. If M = C 2 (mod 4, then there exists t {0, 1,..., n} such that n P k (n; ia i 2 [( n ] + P k (n; t. M k i=0

9 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Result 1 We prove simultaneously Delsarte s linear programming bound and its well known improvements. The proof is based on counting the number of 2 k submatrices of C, where C is considered as a C n matrix (each codeword in C is a row. Definition For each k = 1, 2,..., n, we introduce polynomials k ( ( x n x k P k (n; x = and P + k j k j (n; x = j=0 j odd j=0 j even ( x j ( n x. k j Remark It follows that P + k (n; x + P k (n; x = ( n k. The polynomial P k (n; x := P + k (n; x P k (n; x is called the Krawtchouk polynomial.

10 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices The proof immediately follows from the following lemma. Lemma Let C be a code with size M and distance distribution {A i } n i=0 and let t be the number of columns of C containing an odd number of ones. For each k = 1, 2,..., n, n P k (n; ia i 2 M i=1 [ ( n ] N δp + k (n; t k (1 and n i=1 ( P + n k (n; ia i (M [ ( n ] N δp + k (n; t, (2 k M k where{ N and δ are given by M 2 if M is even N = 4 M 2 1 if M is odd 4 and δ = { 1 if M 2 (mod 4 0 otherwise.

11 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Proof of Lemma Write C = (c mi, 1 m C, 1 i n. Let S 1 (k be the number of 2 k matrices ( cmi1 c A = mi2 c mik c li1 c li2 c lik such that m l, i 1 < i 2 < < i k, and A contains an odd number of 1 s. The entries of A are on the intersection of two rows and k columns of C.

12 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Proof of Lemma (continued For an ordered pair (u, v of different rows of C, to get such a matrix A choose j coordinates (j odd where u and v are differ and choose k j coordinates where u and v are the same.

13 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Proof of Lemma (continued Hence, an ordered pair (u, v will contribute n j=0 j odd ( ( d(u, v n d(u, v = P k (n; d(u, v j k j to S 1 (k. Therefore, S 1 (k = = u,v C u v n i=1 = M P k P k (n; d(u, v = n (n; i u,v C d(u,v=i n P k (n; ia i. i=1 1 i=1 u,v C d(u,v=i P k (n; i

14 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Proof of Lemma (continued Let u 1, u 2,..., u n be the n columns of C. For k columns u i 1, u i 2,..., u i k, to get such a matrix A choose one row such that the intersection of this row with the k columns has an odd number of 1 s and choose another row such that the intersection of that row with the k columns has an even number of 1 s.

15 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Proof of Lemma (continued Hence, S 1 (k = 2 i 1 <i 2 < <i k wt(u i u i k [M wt(u i u i k ]. If M is odd, then δ = 0 by definition. For all i 1 < i 2 < < i k, wt(u i 1 + +u i k [M wt(u i 1 + +u i k ] M 1 M + 1 = M2 1 = N So ( n S 1 (k 2 N = 2N k i 1 <i 2 < <i k [ ( n ] = 2 N δp + k (n; t. k Therefore, (1 is proved if M is odd.

16 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Proof of Lemma (continued If M 0 (mod 4, then δ = 0 by definition. For all i 1 < i 2 < < i k, wt(u i u i k [M wt(u i u i k ] M 2 M 2 = M2 4 = N. So ( n [ ( n ] S 1 (k 2N = 2 N δp + k (n; t. k k Therefore, (1 is proved if M 0 (mod 4.

17 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Proof of Lemma (continued If M 2 (mod 4, then δ = 1 by definition. Let I be the collection of coordinates i such that the column u i contains an odd number of 1 s. If {i 1, i 2,..., i k } I is odd, then wt(u i u i k [M wt(u i u i k ] M 2 However, if {i 1, i 2,..., i k } I is even, then wt(u i u i k [M wt(u i u i k ] M 2 2 S 1 (k 2 [ = 2 N {i 1,i 2,...,i k } I odd ( n k δp + k (n; t Hence, (1 is proved if M 2 (mod 4. N + ]. M 2 = M2 4 = N. M {i 1,i 2,...,i k } I even = N 1. N 1

18 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Proof of Lemma (continued For (2, one can count (two times of the number of 2 k submatrices A such that A contains an even number of 1 s or just use the equality n P (n; ia i + i=1 n i=1 ( P + n (n; ia i = (M 1. k

19 Delsarte s linear programming bound for binary codes Counting the number of 2 k submatrices Theorem (Delsarte s linear programming bound and its improvements Let C be a code with distance distribution {A i } n i=0. For k = 1, 2,..., n, n ( n P k (n; ia i. k i=1 i=1 If M = C is odd, then n ( n P k (n; ia i + 1 ( n. k M k If M = C 2 (mod 4, then there exists t {0, 1,..., n} such that n ( n P k (n; ia i + 2 [( n ] + P k (n; t. k M k i=1 Proof of Theorem Take sum of inequalities (1 and (2 in the above lemma.

20 New upper bounds for binary constant-weight codes Upper bounds for A(n, d, w Definition Given n, d, and w, define A(n, d, w = maximum number of codewords in any code of length n and minimum distance d such that each codeword has exactly w ones.

21 New upper bounds for binary constant-weight codes Counting the number of 1 k submatrices Proposition (1-row k-column formula Let C be a code of length n and constant-weight w. For each k = 1, 2,..., n, wt(u i u i k = MP k (n; w, i 1 < <i k where the sum is taken over all (i 1, i 2,..., i k such that i 1 < i 2 < < i k. Sketch of proof Count the number of 1 k submatrices of C containing an odd number of 1 s.

22 New upper bounds for binary constant-weight codes Counting the number of 2 k submatrices Result 2 (2-row k-column formula Let C be a code of length n and constant-weight w. For each k = 1, 2,..., n, and w P k (n; 2iA 2i 2 M i=d/2 w P + k (n; 2iA 2i 2 M i=d/2 [(( n k r k q k (M q k +r k (q k + 1(M q k 1] [(( n k r k q k (M q k ( n +r k (q k + 1(M q k 1] (M 1, k where q k and r k are the quotient and the remainder, respectively, when dividing MP k (n; w by ( n k, i.e., MP k (n; w = q ( n k k + rk, with 0 r k < ( n k.

23 New upper bounds for binary constant-weight codes New upper bounds on A(n, d, w Sketch of proof Count (two times of the number of 2 k submatrices of C containing an odd (even number of 1 s. Result 2 gives the following new upper bounds for A(n, d, w, n 28. A(18, 6, (428 A(18, 6, (425 A(20, 6, (1421 A(27, 6, (66079 A(27, 6, (84574 A(27, 6, (91080 A(28, 6, ( A(28, 6, ( A(28, 6, (169740

24 New upper bounds for binary constant-weight codes New upper bounds on A(n, d, w New upper bounds A(24, 10, (171 A(24, 10, (223 A(24, 10, (247 A(26, 10, (214 A(27, 10, (299 A(28, 10, (2629 A(26, 12, (48 A(27, 12, (140 A(27, 12, (156 A(28, 12, (149 A(28, 12, (199 A(28, 12, (245 A(28, 12, (265

25 q-ary codes q-ary codes Results 1 and 2 appeared in [B. G. Kang, H. K. Kim, and P. T. Toan, Delsarte s linear programming bound for constant-weight codes," IEEE Trans. Inf. Theory, vol. 58, no. 9, pp , Sep. 2012]. In the remaining, we generalize Results 1 and 2 to q-ary codes.

26 q-ary codes Definition Definition Let F q be a finite field with q elements. A subset C of F n q is called a q-ary code of length n. Definition Given n and d, define A q(n, d = maximum number of codewords in any q-ary code of length n and minimum distance d. Definition Given n, d, and w, define A q(n, d, w = maximum number of codewords in any q-ary code of length n and minimum distance d such that each codeword has weight w.

27 Delsarte s linear programming bound for q-ary codes Delsarte s linear programming bound for q-ary codes Result 3 We prove simultaneously Delsarte s linear programming bound and its well known improvements for q-ary codes. Theorem (Delsarte s linear programming bound and its improvements Let C be a q-ary code with distance distribution {A i } n i=0. Let M = C. For k = 1, 2,..., n, n i=0 P k (n; ia i 1 ( M r(q r(q n 1k 1, k where r is the remainder when dividing M by q and P k (n; x = k ( ( ( 1 j (q 1 k j i n i j k j j=0 is the Krawtchouk polynomial.

28 Delsarte s linear programming bound for q-ary codes Delsarte s linear programming bound for q-ary codes Idea of proof Write C = (c mi, 1 m C, 1 i n. Consider all 2 k matrices ( cmi1 c A = mi2 c mik c li1 c li2 c lik such that m l, i 1 < i 2 < < i k and all vectors where F q = F q \ {0}. α = (α 1, α 2,..., α k (F q k, Count the number of pairs (A, α such that α 1 c mi1 + + α k c mik α 1 c li1 + + α k c lik.

29 New inequalities for q-ary constant-weight codes Inequalities for q-ary constant-weight codes Result 4 Using the same idea in the proof, we get the following new inequalities for q-ary constant-weight codes. Theorem Suppose that {A i } n i=0 is the distance distribution of a q-ary constant-weight code C of length n and constant-weight w. Let M = C. Then for each k = 1, 2,..., n, n i=1 ( P k (n; ia i (M 1(q 1 k n 2q k (q 1M T (k, where T (k = T 1 (k + T 2 (k + T 3 (k.

30 New inequalities for q-ary constant-weight codes Inequalities for q-ary constant-weight codes Notations [ T 1 (k = T 2 (k = (q 1 k ( n k [ (q 1 k ( n k r k ] (M q k q k + r k (M q k 1(q k + 1, ] [( q 1 t k r k sk 2 2 +(q 1 t k t k s k (s k [( q 1 t T 3 (k = r k k s k 2 + (q 1 t kt ks k(s k where ( tk (s k ], 2 ( t k 2 (s k ], q k and r k are the quotient and the remainder, respectively, when dividing 2(q 1M P q k (n; w by (q ( 1k n k, s k and t k are the quotient and the remainder, respectively, when dividing q k by (q 1, s k and t k are the quotient and the remainder, respectively, when dividing q k + 1 by (q 1.

31 New inequalities for q-ary constant-weight codes Inequalities for q-ary constant-weight codes Notations For each k = 1, 2,..., n, P k (n; x = 1 2 k ( [(q 1 j ( 1 j ](q 1 k j x j j=0 ( n x k j (3 and ( P + k (n; x = (q 1 k n P k (n; x. (4 k

32 New inequalities for q-ary constant-weight codes Inequalities for q-ary constant-weight codes For k = 1, the new inequalities give the following corollary, which was shown by P. R. J. Östergård and M. Svanström in [Ternary constant weight codes, Electron. J. Combin., vol. 9, no. 1, 2002]. Corollary If there exists a q-ary code of length n, constant-weight w, and minimum distance d, then where q 2 M(M 1d 2t q 1 i=0 j=i+1 q 2 M i M j + 2(n t q 1 i=0 j=i+1 M i M j, (5 k and t are the quotient and the remainder, respectively, when dividing Mw by n, M 0 = M k 1, M 0 = M k, M i = (k + i/(q 1, and = (k + i 1/(q 1. M i

33 New upper bounds for q-ary constant-weight codes New upper bounds for q-ary constant-weight codes Example Suppose that q = 3 and (n, d, w = (9, 3, 7. The best known upper bound for A 3 (9, 3, 7 is A 3 (9, 3, Suppose that A 3 (9, 3, 7 = 576. Let C be a code whose size attains the upper bound and let {A i } n i=0 be the distance distribution of C. The above theorem gives the following inequalities. 9A 3 + 6A 4 + 3A 5 3A 7 6A 8 9A A 3 + 6A 4 6A 5 9A 6 3A A A A 3 24A 4 18A 5 + 6A A 7 84A A 3 39A A A 6 21A 7 42A A A A A 5 36A 6 21A A 8 126A A A 4 48A 5 15A A 7 84A A A 3 48A 4 24A A 6 57A A 8 36A A A 5 36A A 7 15A 8 + 9A A A 4 16A 5 + 8A 6 4A 7 + 2A 8 A /3

34 New upper bounds for q-ary constant-weight codes New upper bounds for q-ary constant-weight codes Example (continued Since A 0 = 1 and A 1 = A 2 = 0, A i = i=3 9 A i = C = 576. i=0 Consider the following linear programming (where the A i are considered as variables ( 9 max 1 + A i subject to A i 0, i = 3, 4,..., 9 and subject to the above inequalities. Solving this linear programming, we get the maximum value of i=3 A i is 12094/21, which is less than 576. This contradiction shows that such a code C does not exist. Therefore, i=3 A 3 (9, 3,

35 Thank you!

Hypercube Coloring and the Structure of Binary Codes

Hypercube Coloring and the Structure of Binary Codes Hypercube Coloring and the Structure of Binary Codes by James Gregory Rix A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE in The College of Graduate Studies

More information

On equidistant constant weight codes

On equidistant constant weight codes Discrete Applied Mathematics 128 (2003) 157 164 www.elsevier.com/locate/dam On equidistant constant weight codes Fang-Wei Fu a;1, Torleiv KlHve b; ;2, Yuan Luo c, Victor K. Wei b a Temasek Laboratories,

More information

Improved Upper Bounds on Sizes of Codes

Improved Upper Bounds on Sizes of Codes 880 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 4, APRIL 2002 Improved Upper Bounds on Sizes of Codes Beniamin Mounits, Tuvi Etzion, Senior Member, IEEE, and Simon Litsyn, Senior Member, IEEE

More information

ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES

ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES ANDRIES E. BROUWER, ARJEH M. COHEN, MAN V.M. NGUYEN Abstract. All mixed (or asymmetric) orthogonal arrays of strength 3 with run size at most 64 are

More information

The Hamming Codes and Delsarte s Linear Programming Bound

The Hamming Codes and Delsarte s Linear Programming Bound The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the

More information

Delsarte s linear programming bound

Delsarte s linear programming bound 15-859 Coding Theory, Fall 14 December 5, 2014 Introduction For all n, q, and d, Delsarte s linear program establishes a series of linear constraints that every code in F n q with distance d must satisfy.

More information

The Structure of Z 2 Z 2 s-additive Codes: Bounds on the Minimum Distance

The Structure of Z 2 Z 2 s-additive Codes: Bounds on the Minimum Distance Appl Math Inf Sci 7, No 6, 2271-2278 (2013) 2271 Applied Mathematics & Information Sciences An International Journal http://dxdoiorg/1012785/amis/070617 The Structure of Z 2 Z 2 s-additive Codes: Bounds

More information

FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES

FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES ANDRIES E. BROUWER, ARJEH M. COHEN, MAN V.M. NGUYEN Abstract. All mixed (or asymmetric) orthogonal arrays of strength 3 with run size at most

More information

Division of Trinomials by Pentanomials and Orthogonal Arrays

Division of Trinomials by Pentanomials and Orthogonal Arrays Division of Trinomials by Pentanomials and Orthogonal Arrays School of Mathematics and Statistics Carleton University daniel@math.carleton.ca Joint work with M. Dewar, L. Moura, B. Stevens and Q. Wang

More information

A Questionable Distance-Regular Graph

A Questionable Distance-Regular Graph A Questionable Distance-Regular Graph Rebecca Ross Abstract In this paper, we introduce distance-regular graphs and develop the intersection algebra for these graphs which is based upon its intersection

More information

arxiv: v2 [math.co] 17 May 2017

arxiv: v2 [math.co] 17 May 2017 New nonbinary code bounds based on divisibility arguments Sven Polak 1 arxiv:1606.05144v [math.co] 17 May 017 Abstract. For q, n, d N, let A q (n, d) be the maximum size of a code C [q] n with minimum

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

Chapter 2. Error Correcting Codes. 2.1 Basic Notions

Chapter 2. Error Correcting Codes. 2.1 Basic Notions Chapter 2 Error Correcting Codes The identification number schemes we discussed in the previous chapter give us the ability to determine if an error has been made in recording or transmitting information.

More information

11 Minimal Distance and the Parity Check Matrix

11 Minimal Distance and the Parity Check Matrix MATH32031: Coding Theory Part 12: Hamming Codes 11 Minimal Distance and the Parity Check Matrix Theorem 23 (Distance Theorem for Linear Codes) Let C be an [n, k] F q -code with parity check matrix H. Then

More information

Type I Codes over GF(4)

Type I Codes over GF(4) Type I Codes over GF(4) Hyun Kwang Kim San 31, Hyoja Dong Department of Mathematics Pohang University of Science and Technology Pohang, 790-784, Korea e-mail: hkkim@postech.ac.kr Dae Kyu Kim School of

More information

RANK AND PERIMETER PRESERVER OF RANK-1 MATRICES OVER MAX ALGEBRA

RANK AND PERIMETER PRESERVER OF RANK-1 MATRICES OVER MAX ALGEBRA Discussiones Mathematicae General Algebra and Applications 23 (2003 ) 125 137 RANK AND PERIMETER PRESERVER OF RANK-1 MATRICES OVER MAX ALGEBRA Seok-Zun Song and Kyung-Tae Kang Department of Mathematics,

More information

Extended 1-perfect additive codes

Extended 1-perfect additive codes Extended 1-perfect additive codes J.Borges, K.T.Phelps, J.Rifà 7/05/2002 Abstract A binary extended 1-perfect code of length n + 1 = 2 t is additive if it is a subgroup of Z α 2 Zβ 4. The punctured code

More information

We saw in the last chapter that the linear Hamming codes are nontrivial perfect codes.

We saw in the last chapter that the linear Hamming codes are nontrivial perfect codes. Chapter 5 Golay Codes Lecture 16, March 10, 2011 We saw in the last chapter that the linear Hamming codes are nontrivial perfect codes. Question. Are there any other nontrivial perfect codes? Answer. Yes,

More information

ON LINEAR CODES WHOSE WEIGHTS AND LENGTH HAVE A COMMON DIVISOR. 1. Introduction

ON LINEAR CODES WHOSE WEIGHTS AND LENGTH HAVE A COMMON DIVISOR. 1. Introduction ON LINEAR CODES WHOSE WEIGHTS AND LENGTH HAVE A COMMON DIVISOR SIMEON BALL, AART BLOKHUIS, ANDRÁS GÁCS, PETER SZIKLAI, AND ZSUZSA WEINER Abstract. In this paper we prove that a set of points (in a projective

More information

Orthogonal Arrays & Codes

Orthogonal Arrays & Codes Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible

More information

A Short Overview of Orthogonal Arrays

A Short Overview of Orthogonal Arrays A Short Overview of Orthogonal Arrays John Stufken Department of Statistics University of Georgia Isaac Newton Institute September 5, 2011 John Stufken (University of Georgia) Orthogonal Arrays September

More information

Galois geometries contributing to coding theory

Galois geometries contributing to coding theory Ghent University Dept. of Pure Mathematics and Computer Algebra Krijgslaan 281 - S22 9000 Ghent Belgium Thurnau, April 15, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 EXTENDABILITY RESULTS

More information

On non-antipodal binary completely regular codes

On non-antipodal binary completely regular codes On non-antipodal binary completely regular codes J. Borges, J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, 08193-Bellaterra, Spain. V.A. Zinoviev Institute

More information

Arrangements, matroids and codes

Arrangements, matroids and codes Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde

More information

New binary self-dual codes of lengths 50 to 60

New binary self-dual codes of lengths 50 to 60 Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) New binary self-dual codes of lengths 50 to 60 Nikolay Yankov Moon Ho Lee Received: date / Accepted: date Abstract Using

More information

Can You Hear Me Now?

Can You Hear Me Now? Can You Hear Me Now? An Introduction to Coding Theory William J. Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 19 October 2004 W. J. Turner (Wabash College)

More information

Lecture 17: Perfect Codes and Gilbert-Varshamov Bound

Lecture 17: Perfect Codes and Gilbert-Varshamov Bound Lecture 17: Perfect Codes and Gilbert-Varshamov Bound Maximality of Hamming code Lemma Let C be a code with distance 3, then: C 2n n + 1 Codes that meet this bound: Perfect codes Hamming code is a perfect

More information

Binary Convolutional Codes of High Rate Øyvind Ytrehus

Binary Convolutional Codes of High Rate Øyvind Ytrehus Binary Convolutional Codes of High Rate Øyvind Ytrehus Abstract The function N(r; ; d free ), defined as the maximum n such that there exists a binary convolutional code of block length n, dimension n

More information

Codes and Designs in the Grassmann Scheme

Codes and Designs in the Grassmann Scheme Codes and Designs in the Grassmann Scheme Tuvi Etzion Computer Science Department Technion -Israel Institute of Technology etzion@cs.technion.ac.il ALGEBRAIC COMBINATORICS AND APPLICATIONS ALCOMA10, Thurnau,

More information

Lower Bounds for q-ary Codes with Large Covering Radius

Lower Bounds for q-ary Codes with Large Covering Radius Lower Bounds for q-ary Codes with Large Covering Radius Wolfgang Haas Immanuel Halupczok Jan-Christoph Schlage-Puchta Albert-Ludwigs-Universität Mathematisches Institut Eckerstr. 1 79104 Freiburg, Germany

More information

Extended Binary Linear Codes from Legendre Sequences

Extended Binary Linear Codes from Legendre Sequences Extended Binary Linear Codes from Legendre Sequences T. Aaron Gulliver and Matthew G. Parker Abstract A construction based on Legendre sequences is presented for a doubly-extended binary linear code of

More information

Partial permutation decoding for binary linear Hadamard codes

Partial permutation decoding for binary linear Hadamard codes Partial permutation decoding for binary linear Hadamard codes R. D. Barrolleta 1 and M. Villanueva 2 Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona Cerdanyola

More information

Lecture 19: Elias-Bassalygo Bound

Lecture 19: Elias-Bassalygo Bound Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecturer: Atri Rudra Lecture 19: Elias-Bassalygo Bound October 10, 2007 Scribe: Michael Pfetsch & Atri Rudra In the last lecture,

More information

7.1 Definitions and Generator Polynomials

7.1 Definitions and Generator Polynomials Chapter 7 Cyclic Codes Lecture 21, March 29, 2011 7.1 Definitions and Generator Polynomials Cyclic codes are an important class of linear codes for which the encoding and decoding can be efficiently implemented

More information

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane 2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and

More information

COUNTING NUMERICAL SEMIGROUPS BY GENUS AND SOME CASES OF A QUESTION OF WILF

COUNTING NUMERICAL SEMIGROUPS BY GENUS AND SOME CASES OF A QUESTION OF WILF COUNTING NUMERICAL SEMIGROUPS BY GENUS AND SOME CASES OF A QUESTION OF WILF NATHAN KAPLAN Abstract. The genus of a numerical semigroup is the size of its complement. In this paper we will prove some results

More information

Product of P-polynomial association schemes

Product of P-polynomial association schemes Product of P-polynomial association schemes Ziqing Xiang Shanghai Jiao Tong University Nov 19, 2013 1 / 20 P-polynomial association scheme Definition 1 P-polynomial association scheme A = (X, {A i } 0

More information

Galois geometries contributing to coding theory

Galois geometries contributing to coding theory Ghent University Dept. of Mathematics Krijgslaan 281 - S22 9000 Ghent Belgium Opatija, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 COVERING RADIUS AND SATURATING SETS 4 LINEAR MDS CODES

More information

Extending MDS Codes. T. L. Alderson

Extending MDS Codes. T. L. Alderson Extending MDS Codes T. L. Alderson Abstract A q-ary (n,k)-mds code, linear or not, satisfies n q + k 1. A code meeting this bound is said to have maximum length. Using purely combinatorial methods we show

More information

Econ 204 Supplement to Section 3.6 Diagonalization and Quadratic Forms. 1 Diagonalization and Change of Basis

Econ 204 Supplement to Section 3.6 Diagonalization and Quadratic Forms. 1 Diagonalization and Change of Basis Econ 204 Supplement to Section 3.6 Diagonalization and Quadratic Forms De La Fuente notes that, if an n n matrix has n distinct eigenvalues, it can be diagonalized. In this supplement, we will provide

More information

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields

More information

Construction X for quantum error-correcting codes

Construction X for quantum error-correcting codes Simon Fraser University Burnaby, BC, Canada joint work with Vijaykumar Singh International Workshop on Coding and Cryptography WCC 2013 Bergen, Norway 15 April 2013 Overview Construction X is known from

More information

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive

More information

On the Griesmer bound for nonlinear codes

On the Griesmer bound for nonlinear codes On the Griesmer bound for nonlinear codes Emanuele Bellini, Alessio Meneghetti To cite this version: Emanuele Bellini, Alessio Meneghetti. On the Griesmer bound for nonlinear codes. Pascale Charpin, Nicolas

More information

Formally self-dual additive codes over F 4

Formally self-dual additive codes over F 4 Formally self-dual additive codes over F Sunghyu Han School of Liberal Arts, Korea University of Technology and Education, Cheonan 0-708, South Korea Jon-Lark Kim Department of Mathematics, University

More information

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q MATH-315201 This question paper consists of 6 printed pages, each of which is identified by the reference MATH-3152 Only approved basic scientific calculators may be used. c UNIVERSITY OF LEEDS Examination

More information

On sets without tangents and exterior sets of a conic

On sets without tangents and exterior sets of a conic On sets without tangents and exterior sets of a conic Geertrui Van de Voorde Abstract A set without tangents in PG(2, q) is a set of points S such that no line meets S in exactly one point. An exterior

More information

On Computing the Hamming Distance

On Computing the Hamming Distance Acta Cybernetica 16 (2004) 443 449. On Computing the Hamming Distance Gerzson Kéri and Ákos Kisvölcsey Abstract Methods for the fast computation of Hamming distance developed for the case of large number

More information

Hamming Codes 11/17/04

Hamming Codes 11/17/04 Hamming Codes 11/17/04 History In the late 1940 s Richard Hamming recognized that the further evolution of computers required greater reliability, in particular the ability to not only detect errors, but

More information

Circulant Hadamard matrices as HFP-codes of type C 4n C 2. arxiv: v1 [math.co] 26 Nov 2017

Circulant Hadamard matrices as HFP-codes of type C 4n C 2. arxiv: v1 [math.co] 26 Nov 2017 Circulant Hadamard matrices as HFP-codes of type C 4n C 2. arxiv:1711.09373v1 [math.co] 26 Nov 2017 J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona October

More information

Some results on cross-correlation distribution between a p-ary m-sequence and its decimated sequences

Some results on cross-correlation distribution between a p-ary m-sequence and its decimated sequences Some results on cross-correlation distribution between a p-ary m-sequence and its decimated sequences A joint work with Chunlei Li, Xiangyong Zeng, and Tor Helleseth Selmer Center, University of Bergen

More information

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps 2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical

More information

Error control codes for parallel asymmetric channels

Error control codes for parallel asymmetric channels Error control codes for parallel asymmetric channels R. Ahlswede and H. Aydinian Department of Mathematics University of Bielefeld POB 100131 D-33501 Bielefeld, Germany E-mail addresses: ahlswede@mathematik.uni-bielefeld.de

More information

DISTANCE COLORINGS OF HYPERCUBES FROM Z 2 Z 4 -LINEAR CODES

DISTANCE COLORINGS OF HYPERCUBES FROM Z 2 Z 4 -LINEAR CODES DISTANCE COLORINGS OF HYPERCUBES FROM Z 2 Z 4 -LINEAR CODES GRETCHEN L. MATTHEWS Abstract. In this paper, we give distance-` colorings of the hypercube using nonlinear binary codes which are images of

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

A Characterization Of Quantum Codes And Constructions

A Characterization Of Quantum Codes And Constructions A Characterization Of Quantum Codes And Constructions Chaoping Xing Department of Mathematics, National University of Singapore Singapore 117543, Republic of Singapore (email: matxcp@nus.edu.sg) Abstract

More information

Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q)

Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q) Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q) M. Lavrauw L. Storme G. Van de Voorde October 4, 2007 Abstract In this paper, we study the p-ary linear code C k (n, q),

More information

International Mathematical Forum, Vol. 6, 2011, no. 4, Manjusri Basu

International Mathematical Forum, Vol. 6, 2011, no. 4, Manjusri Basu International Mathematical Forum, Vol 6, 011, no 4, 185-191 Square Designs on New Binary ( 3n 1, 3 n ) Codes Manjusri Basu Department of Mathematics University of Kalyani Kalyani, WB, India, Pin-74135

More information

Week 15-16: Combinatorial Design

Week 15-16: Combinatorial Design Week 15-16: Combinatorial Design May 8, 2017 A combinatorial design, or simply a design, is an arrangement of the objects of a set into subsets satisfying certain prescribed properties. The area of combinatorial

More information

Optimal XOR based (2,n)-Visual Cryptography Schemes

Optimal XOR based (2,n)-Visual Cryptography Schemes Optimal XOR based (2,n)-Visual Cryptography Schemes Feng Liu and ChuanKun Wu State Key Laboratory Of Information Security, Institute of Software Chinese Academy of Sciences, Beijing 0090, China Email:

More information

On Linear Subspace Codes Closed under Intersection

On Linear Subspace Codes Closed under Intersection On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F

More information

Quantum LDPC Codes Derived from Combinatorial Objects and Latin Squares

Quantum LDPC Codes Derived from Combinatorial Objects and Latin Squares Codes Derived from Combinatorial Objects and s Salah A. Aly & Latin salah at cs.tamu.edu PhD Candidate Department of Computer Science Texas A&M University November 11, 2007 Motivation for Computers computers

More information

Properties of the Integers

Properties of the Integers Properties of the Integers The set of all integers is the set and the subset of Z given by Z = {, 5, 4, 3, 2, 1, 0, 1, 2, 3, 4, 5, }, N = {0, 1, 2, 3, 4, }, is the set of nonnegative integers (also called

More information

A characterization of graphs by codes from their incidence matrices

A characterization of graphs by codes from their incidence matrices A characterization of graphs by codes from their incidence matrices Peter Dankelmann Department of Mathematics University of Johannesburg P.O. Box 54 Auckland Park 006, South Africa Jennifer D. Key pdankelmann@uj.ac.za

More information

a + b = b + a and a b = b a. (a + b) + c = a + (b + c) and (a b) c = a (b c). a (b + c) = a b + a c and (a + b) c = a c + b c.

a + b = b + a and a b = b a. (a + b) + c = a + (b + c) and (a b) c = a (b c). a (b + c) = a b + a c and (a + b) c = a c + b c. Properties of the Integers The set of all integers is the set and the subset of Z given by Z = {, 5, 4, 3, 2, 1, 0, 1, 2, 3, 4, 5, }, N = {0, 1, 2, 3, 4, }, is the set of nonnegative integers (also called

More information

Visual Cryptography Schemes with Optimal Pixel Expansion

Visual Cryptography Schemes with Optimal Pixel Expansion Visual Cryptography Schemes with Optimal Pixel Expansion Carlo Blundo, Stelvio Cimato and Alfredo De Santis Dipartimento di Informatica ed Applicazioni Università degli Studi di Salerno, 808, Baronissi

More information

4. Algebra and Duality

4. Algebra and Duality 4-1 Algebra and Duality P. Parrilo and S. Lall, CDC 2003 2003.12.07.01 4. Algebra and Duality Example: non-convex polynomial optimization Weak duality and duality gap The dual is not intrinsic The cone

More information

NORTHWESTERN UNIVERSITY Thrusday, Oct 6th, 2011 ANSWERS FALL 2011 NU PUTNAM SELECTION TEST

NORTHWESTERN UNIVERSITY Thrusday, Oct 6th, 2011 ANSWERS FALL 2011 NU PUTNAM SELECTION TEST Problem A1. Let a 1, a 2,..., a n be n not necessarily distinct integers. exist a subset of these numbers whose sum is divisible by n. Prove that there - Answer: Consider the numbers s 1 = a 1, s 2 = a

More information

SOME DESIGNS AND CODES FROM L 2 (q) Communicated by Alireza Abdollahi

SOME DESIGNS AND CODES FROM L 2 (q) Communicated by Alireza Abdollahi Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 3 No. 1 (2014), pp. 15-28. c 2014 University of Isfahan www.combinatorics.ir www.ui.ac.ir SOME DESIGNS AND CODES FROM

More information

Invertible Matrices over Idempotent Semirings

Invertible Matrices over Idempotent Semirings Chamchuri Journal of Mathematics Volume 1(2009) Number 2, 55 61 http://www.math.sc.chula.ac.th/cjm Invertible Matrices over Idempotent Semirings W. Mora, A. Wasanawichit and Y. Kemprasit Received 28 Sep

More information

Index Coding With Erroneous Side Information

Index Coding With Erroneous Side Information Index Coding With Erroneous Side Information Jae-Won Kim and Jong-Seon No, Fellow, IEEE 1 Abstract arxiv:1703.09361v1 [cs.it] 28 Mar 2017 In this paper, new index coding problems are studied, where each

More information

arxiv: v4 [cs.it] 14 May 2013

arxiv: v4 [cs.it] 14 May 2013 arxiv:1006.1694v4 [cs.it] 14 May 2013 PURE ASYMMETRIC QUANTUM MDS CODES FROM CSS CONSTRUCTION: A COMPLETE CHARACTERIZATION MARTIANUS FREDERIC EZERMAN Centre for Quantum Technologies, National University

More information

Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights

Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Qichun Wang Abstract It is known that correlation-immune (CI) Boolean functions used

More information

Steiner triple and quadruple systems of low 2-rank

Steiner triple and quadruple systems of low 2-rank Steiner triple and quadruple systems of low 2-rank Vladimir D. Tonchev Department of Mathematical Sciences Michigan Technological University Houghton, MI 49931, USA tonchev@mtu.edu, www.math.mtu.edu/ tonchev

More information

TC08 / 6. Hadamard codes SX

TC08 / 6. Hadamard codes SX TC8 / 6. Hadamard codes 3.2.7 SX Hadamard matrices Hadamard matrices. Paley s construction of Hadamard matrices Hadamard codes. Decoding Hadamard codes A Hadamard matrix of order is a matrix of type whose

More information

Visual cryptography schemes with optimal pixel expansion

Visual cryptography schemes with optimal pixel expansion Theoretical Computer Science 369 (2006) 69 82 wwwelseviercom/locate/tcs Visual cryptography schemes with optimal pixel expansion Carlo Blundo a,, Stelvio Cimato b, Alfredo De Santis a a Dipartimento di

More information

LIFTED CODES OVER FINITE CHAIN RINGS

LIFTED CODES OVER FINITE CHAIN RINGS Math. J. Okayama Univ. 53 (2011), 39 53 LIFTED CODES OVER FINITE CHAIN RINGS Steven T. Dougherty, Hongwei Liu and Young Ho Park Abstract. In this paper, we study lifted codes over finite chain rings. We

More information

Incidence Structures Related to Difference Sets and Their Applications

Incidence Structures Related to Difference Sets and Their Applications aòµ 05B30 ü èµ Æ Òµ 113350 Æ Æ Ø Ø K8: 'u8'é(9ùa^ = Ø K8: Incidence Structures Related to Difference Sets and Their Applications úôœææ Æ Ø ž

More information

1 2 3 style total. Circle the correct answer; no explanation is required. Each problem in this section counts 5 points.

1 2 3 style total. Circle the correct answer; no explanation is required. Each problem in this section counts 5 points. 1 2 3 style total Math 415 Examination 3 Please print your name: Answer Key 1 True/false Circle the correct answer; no explanation is required. Each problem in this section counts 5 points. 1. The rings

More information

Lecture Introduction. 2 Linear codes. CS CTT Current Topics in Theoretical CS Oct 4, 2012

Lecture Introduction. 2 Linear codes. CS CTT Current Topics in Theoretical CS Oct 4, 2012 CS 59000 CTT Current Topics in Theoretical CS Oct 4, 01 Lecturer: Elena Grigorescu Lecture 14 Scribe: Selvakumaran Vadivelmurugan 1 Introduction We introduced error-correcting codes and linear codes in

More information

Linear Codes, Target Function Classes, and Network Computing Capacity

Linear Codes, Target Function Classes, and Network Computing Capacity Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:

More information

exercise in the previous class (1)

exercise in the previous class (1) exercise in the previous class () Consider an odd parity check code C whose codewords are (x,, x k, p) with p = x + +x k +. Is C a linear code? No. x =, x 2 =x =...=x k = p =, and... is a codeword x 2

More information

arxiv: v2 [cs.it] 25 Jul 2010

arxiv: v2 [cs.it] 25 Jul 2010 On Optimal Anticodes over Permutations with the Infinity Norm Itzhak Tamo arxiv:1004.1938v [cs.it] 5 Jul 010 Abstract Department of Electrical and Computer Engineering, Ben-Gurion University, Israel Moshe

More information

IN [1] Kiermaier and Zwanzger construct the extended dualized Kerdock codes ˆK

IN [1] Kiermaier and Zwanzger construct the extended dualized Kerdock codes ˆK New upper bounds on binary linear codes and a Z 4 -code with a better-than-linear Gray image Michael Kiermaier, Alfred Wassermann, and Johannes Zwanzger 1 arxiv:1503.03394v2 [cs.it] 16 Mar 2016 Abstract

More information

Generalized hyper-bent functions over GF(p)

Generalized hyper-bent functions over GF(p) Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G

More information

Zero-sum square matrices

Zero-sum square matrices Zero-sum square matrices Paul Balister Yair Caro Cecil Rousseau Raphael Yuster Abstract Let A be a matrix over the integers, and let p be a positive integer. A submatrix B of A is zero-sum mod p if the

More information

arxiv: v1 [cs.dm] 20 Jul 2009

arxiv: v1 [cs.dm] 20 Jul 2009 New Binomial Bent Function over the Finite Fields of Odd Characteristic Tor Helleseth and Alexander Kholosha arxiv:0907.3348v1 [cs.dm] 0 Jul 009 The Selmer Center Department of Informatics, University

More information

UNIT MEMORY CONVOLUTIONAL CODES WITH MAXIMUM DISTANCE

UNIT MEMORY CONVOLUTIONAL CODES WITH MAXIMUM DISTANCE UNIT MEMORY CONVOLUTIONAL CODES WITH MAXIMUM DISTANCE ROXANA SMARANDACHE Abstract. Unit memory codes and in particular, partial unit memory codes are reviewed. Conditions for the optimality of partial

More information

MATH32031: Coding Theory Part 15: Summary

MATH32031: Coding Theory Part 15: Summary MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,

More information

MATH3302. Coding and Cryptography. Coding Theory

MATH3302. Coding and Cryptography. Coding Theory MATH3302 Coding and Cryptography Coding Theory 2010 Contents 1 Introduction to coding theory 2 1.1 Introduction.......................................... 2 1.2 Basic definitions and assumptions..............................

More information

The Distribution of Generalized Sum-of-Digits Functions in Residue Classes

The Distribution of Generalized Sum-of-Digits Functions in Residue Classes Journal of umber Theory 79, 9426 (999) Article ID jnth.999.2424, available online at httpwww.idealibrary.com on The Distribution of Generalized Sum-of-Digits Functions in Residue Classes Abigail Hoit Department

More information

642:550, Summer 2004, Supplement 6 The Perron-Frobenius Theorem. Summer 2004

642:550, Summer 2004, Supplement 6 The Perron-Frobenius Theorem. Summer 2004 642:550, Summer 2004, Supplement 6 The Perron-Frobenius Theorem. Summer 2004 Introduction Square matrices whose entries are all nonnegative have special properties. This was mentioned briefly in Section

More information

MULTI-RESTRAINED STIRLING NUMBERS

MULTI-RESTRAINED STIRLING NUMBERS MULTI-RESTRAINED STIRLING NUMBERS JI YOUNG CHOI DEPARTMENT OF MATHEMATICS SHIPPENSBURG UNIVERSITY SHIPPENSBURG, PA 17257, U.S.A. Abstract. Given positive integers n, k, and m, the (n, k)-th m- restrained

More information

The Witt designs, Golay codes and Mathieu groups

The Witt designs, Golay codes and Mathieu groups The Witt designs, Golay codes and Mathieu groups 1 The Golay codes Let V be a vector space over F q with fixed basis e 1,..., e n. A code C is a subset of V. A linear code is a subspace of V. The vector

More information

April 25 May 6, 2016, Verona, Italy. GAME THEORY and APPLICATIONS Mikhail Ivanov Krastanov

April 25 May 6, 2016, Verona, Italy. GAME THEORY and APPLICATIONS Mikhail Ivanov Krastanov April 25 May 6, 2016, Verona, Italy GAME THEORY and APPLICATIONS Mikhail Ivanov Krastanov Games in normal form There are given n-players. The set of all strategies (possible actions) of the i-th player

More information

Some Nordhaus-Gaddum-type Results

Some Nordhaus-Gaddum-type Results Some Nordhaus-Gaddum-type Results Wayne Goddard Department of Mathematics Massachusetts Institute of Technology Cambridge, USA Michael A. Henning Department of Mathematics University of Natal Pietermaritzburg,

More information

Groups of Prime Power Order with Derived Subgroup of Prime Order

Groups of Prime Power Order with Derived Subgroup of Prime Order Journal of Algebra 219, 625 657 (1999) Article ID jabr.1998.7909, available online at http://www.idealibrary.com on Groups of Prime Power Order with Derived Subgroup of Prime Order Simon R. Blackburn*

More information

Non-Interactive Zero Knowledge (II)

Non-Interactive Zero Knowledge (II) Non-Interactive Zero Knowledge (II) CS 601.442/642 Modern Cryptography Fall 2017 S 601.442/642 Modern CryptographyNon-Interactive Zero Knowledge (II) Fall 2017 1 / 18 NIZKs for NP: Roadmap Last-time: Transformation

More information

Problems for Putnam Training

Problems for Putnam Training Problems for Putnam Training 1 Number theory Problem 1.1. Prove that for each positive integer n, the number is not prime. 10 1010n + 10 10n + 10 n 1 Problem 1.2. Show that for any positive integer n,

More information

P = 1 F m(p ) = IP = P I = f(i) = QI = IQ = 1 F m(p ) = Q, so we are done.

P = 1 F m(p ) = IP = P I = f(i) = QI = IQ = 1 F m(p ) = Q, so we are done. Section 1.6: Invertible Matrices One can show (exercise) that the composition of finitely many invertible functions is invertible. As a result, we have the following: Theorem 6.1: Any admissible row operation

More information