Generalized weights and bounds for error probability over erasure channels
|
|
- Iris Hunter
- 5 years ago
- Views:
Transcription
1 Generalized weights and bounds for error probability over erasure channels Leandro Cruvinel Lemes Department of Electrical Engineering Federal University of Triangulo Mineiro Uberaba - MG, Brazil leandro@icteuftmedubr Marcelo Firer Department of Mathematics State University of Campinas Campinas - SP, Brazil mfirer@imeunicampbr Abstract New upper and lower bounds for the error probability over an erasure channel are provided, making use of Wei s generalized weights, hierarchy and spectra In many situations the upper and lower bounds coincide and this allows us to improve the existing bounds Results concerning MDS and AMDS codes are deduced from those bounds I INTRODUCTION Generalized weights of a linear code were introduced by Victor Wei in [1] and became relevant invariants in Coding Theory, being determined for particular classes of codes [2], [3], [4], [5], [6], [7], [8], [9] and bounded when explicit formulas are not available [1], [11] However, the importance of those invariants concerning one of the main problems of Coding Theory - estimating the efficiency of a code in terms of errors correction - has not yet been properly explored In this work, we consider a q-ary erasure channel and give an expression for the error probability Proposition 22 that separates the variables of the problem namely, the code and the channel, where for error probability we mean either ambiguity probability or the decoding error s probability Considering the hierarchy and spectra of generalized weights, we are able to get new bounds for the error probability of linear codes Theorem 44 It turns out that, in many cases, the upper bounds for ambiguity are better then the ones determined by Didier in [12] and the lower bound better then those determined by Fashandi et al in [13], where the authors are concerned mainly with codes over large alphabets In the last section V we consider separation properties MDS and generalizations, we show that for MDS and AMDS codes the upper and lower bounds obtained for error probability collapse, becoming hence an exact expression for the error probability, what was already known to Fashandi et al [13] in the MDS case and conclude by showing the minimizing role of MDS and AMDS codes when considering and overall error probability sufficiently small A Erasure Channel II BASIC DEFINITIONS AND NOTATION In this work we consider a Discrete Erasure Channels DEC defined by an input alphabet X = F q finite field with q elements, an output alphabet Y = F q {ɛ} where ɛ / F q is called the erasure symbol and a probability function P i j := Pr [Y = j X = i] defined by: a P j i =, for i j and {i, j} X ; b P i i = 1 p, for π 1; c P ɛ i = p, for i X, The constant < p < 1/2 is called the overall error probability of the channel A Discrete Memoryless Erasure Channels DMEC is obtained by defining n P y x = P yl x l, 1 l=1 where, x = x 1, x 2,, x n X n and y = y 1, y 2,, y n Y n B Generalized weights Given integers r, s Z with r < s, we denote r, s := {r, r + 1,, s 1, s} For simplicity, we write n := 1, n Let C F n q be an [n, k] q -linear code Since in this work we will consider only linear codes, this adjective may be omitted Given x F n q, the support of x is suppx = {i n ; with x i } and the Hamming distance may be expressed as dx, x = suppx x, where A denotes the cardinality of A Given a subcode D C, the support of D is defined as suppd = suppx x D and the generalized weight C of D is defined as C = min{ suppd ; D C and dim D = i}, for i k It is well known Wei s Theorem [1] that the generalized weights are strictly increasing d 1 C < d 2 C < < d k C and we call {d 1 C, d 2 C,, d k C} the weight hierarchy of C We denote by A i j = Ai j C, i k and j n, the set of all i-dimensional linear subcodes D C supported by j coordinates, that is, A i jc = {D C; suppd = j and dim D = i}
2 The cardinality of A i j is called the i-th generalized spectra with support j of the code C and we denote A i j = A i j We call the matrix A i j the code C Ambiguity,,k;j=, n the spectra-matrix of Considering a code C F n q and a DMEC, some messages in Y n will never be received We denote by E C the subset of messages that may be received, that is, E C = {y Y n ; P receive y } and call it the set of admissible or possible messages, where P receive y is the probability to receive y Y n Given x X n, we denote by P send x the priori probability of x so that n E C = {y Y n ; x C with P send x P yl x l } Given y Y n let R := Ry = {i n ; y i = ɛ} and define the set [y] R of R-ambiguities of y as l=1 [y] R := {x C; P y x } We note that [y] R depends both on y and C We remark that, when using a Maximum Likelihood decoder, once the message y is received, the elements of [y] R are the possible choices for decoding y We say that y is an ambiguity of C if [y] R > 1 We identify F n q with the product Π n i=1 F q i and, given R n, we denote by π R the projection of x = x i i n in the coordinates of R: π R x = x i i R To shorten the notation we will write π R x = x R We also denote by E R the set of admissible messages that has an erasure on the coordinates in R, that is, E R = {y E C ; y i = ɛ, i R} Given R n let R := {i n ; i / R} be the complement of R The following proposition consists of a sequence of elementary properties that are stated without a proof for future reference Proposition 21: Considering a DMEC, y Y n, R n and C a linear code, we have that i [y] R = iff y / E C ; i [y] R = {x C; x R = y R}; iii [] R is the kernel of the projection map π R restricted to the code C; iv For any y E C, [y] R = [ R ] ; v E R = q k 1 D Error probability for ambiguity and decoding We are considering an DMEC with conditional probabilities defined by 1, with overall error probability p and prior probabilities identically distributed, that is, P i = q 1, i F q Given y Y n we denote by P receive y the probability that y is received and by P amb y the probability that y is ambiguous The ambiguity probability of an [n, k] q -code C or the error probability before decoding procedures is P amb C = P amb yp receive y y Y n = P amb yp receive y, y E C where the last equality follows from statement i in Proposition 21 Considering a maximum likelihood decoding criteria, we denote by P dec y the probability of y Y n being decoded incorrectly and define the decoding error probability of an [n, k] q -code C as P dec C = y Y n P dec yp receive y = y E C P dec yp receive y, where the last equality again follows from statement i in Proposition 21 We will use P C to denote either P amb C or P dec C, that is, we may consider to mean either dec or amb, so that both the previous expressions may be written as P C = y E C P yp receive y 2 Since we are assuming that P i = q 1, i F q, the probability that a message y is receives P receive y = x C P y xp send x = 1 q k x C P y x Considering an admissible message y E C, we have P receive y = x [] R q k p R 1 p R 3 = q k p R 1 p R 4 Substituting expression 3 into equation 2 we get P C = y E C P yq k p R 1 p R, 5 hence we may write 5 as P C = P y E H q k p R 1 p R R n
3 and, from statement v in Proposition 21 it follows that P C = P Rp R 1 p R 6 R n We note that we are exchanging P y by P R and this is possible since those probabilities do not depend on y but only at what are the erased coordinates of y, that is, on the set Denoting we may write 6 as We note that R = Ry = {i n ; y i = ɛ} Q,r = P C = Q dec,r = Q amb,r = R; R =r P R, 7 n Q,r p r 1 p n r 8 r= {R n ; R =r} {R n ; R =r} where α is the smallest integer greater or equal to α R In our case, we have that 1 1 { if []R = 1; = 1 if > 1, that is, it equals 1 or according if there is more then one or only one namely y admissible messages having R as a set of ambiguous coordinates We define a i r := a i rc = {R n ; R = r and dim[] R = i} 11 and { 1 1 q, for = dec; δ,i = 1 i 1q, for = amb i We note that each a i r depends on the code C, since [] R is the kernel of the projection π R restricted to C We also remark that k n a i r = 12 r With this notation we have that k Q,r = a i rδ,i 13 so that equation 6 may be expressen a vectorial form: Proposition 22: The ambiguity probability and the decoding error probability of a linear code may be expressed as the product P C = δ Λρ T 14 where δ = δ,,, δ,k, ρ = 1 p n, p1 p n 1,, p n, ρ T is the transpose of the vector ρ and a a 1 a n Λ = 15 a k a k 1 a k n We remark that δ depends only on the the parameters [n, k] q and on meaning decoding or ambiguity ; ρ depends only at the channel not on the code; the matrix Λ depends only on the code C, not on the channel neither on meaning decoding or ambiguity For this reason, since only Λ depends on the code C, when looking for bounds, we will focus the attention on this matrix, which we call the supportmatrix of C III SUPPORT-MATRIX AND SPECTRA-MATRIX OF A CODE In this section and from here on, we will assume that d k = n We wish to establish a relation between the support-matrix and the spectra-matrix of a code and we start with two simple lemmas Lemma 31: Let C be a code, D A i rc and s n Then, D contains a set of linearly independent vectors {x 1,, x i 1 } D such that π s x j =, for any j i 1 Proof: Let R = suppd and let us assume first that s / R But this implies that π {s} x =, for every x D and the result follows from the fact that dimd = i Let us now assume that s R Since R = suppd, there is x D such that π {s} x We consider a basis of the subspace D containing x, let us say {x, u 1, u i 1 } We define x j = u j π su j π s x x ant is immediate to check that {x 1,, x i 1 } is linearly independent and π s x j =, for any j i 1 Lemma 32: For every i k the coefficient A i of the spectra-matrix depends on the number of different supports attained by subcodes in A i, that is, A i = {R; R = supp D and D A i } Proof: It is enough to prove that for D 1, D 2 A i, if D 1 D 2, then supp D 1 supp D 2 For D 1 D 2 we may assume wlog there is x D 2 \ D 1 We suppose suppd 1 = suppd 2 = R and will show that this leads to a contradiction Since x D 2 \ D 1, the subspace D = {x} D 1 has dimension i + 1 and since suppx suppd 1 = R, we have that suppd = R and, from Lemma 31, given s R there is a linearly independent set {x 1,, x i } D such that π {s} x j =, j i Denoting D = x 1,, x i we have that dim D = i and supp D R \ {s}, that is, supp D <, a contradiction We are now able to determine a i r = for r :
4 Proposition 33: For any i = 1, k, the coefficients of the support-matrix of a code C satisfy { for r < a i di ; r = A i for r = Proof: We first consider the case r = If we put B = {R n ; dim [] R = i and R = } we have, by definition, that B = a i It follows from Lemma 32 that we only need to prove that B = {R; R = supp D and D A i } Let us consider R n with dim[] R = i and R = and let us prove that supp[] R = R We know that supp[] R R and we can not have supp[] R > R Since dim[] H = i and supp[] R R =, it follows that supp[] R = R hence a i = A i We consider now the case r < Given r <, suppose that a i r > This implies there is R n with R = r and dim[] R = i But supp[] R R and this implies r = R supp[] R, a contradiction It follows that a i r =, for all r < We remark that the condition r = is strictly necessary in Proposition 33 Considering for example the [3, 2] 2 -code generated by the vectors {1,,,, 1, 1} for r = 2 and d 2 = 3 we have that A 1 2 = 1 and a 1 2 = 3 Wei s Monotonicity Theorem states that i < j implies < d j, so Proposition 33 ensures the following: Corollary 34: If j < i then a i d j = We continue with some results that will be used to produce the expected bounds for the error probability Lemma 35: Let R n, with R = r an = dim[] R Then, for any j n \ R we have that dim[] R {j} maxk + r + 1 n, i 16 Proof: Denoting S j = R {j}, from item iii in Proposition 21 we have [] Sj = kerπ Sj Considering that may be expressed as the composition π Sj of the projections π Sj = π {j} π R 17 π π R C F n r {j} q F n r 1 q s n c se s s R c se s s S j c s e s, the classical Kernel Theorem ensures that that is, dimc = dimimπ Sj + dimkerπ Sj, But equation 17 implies dim [] Sj = k dimimπ Sj 18 dimimπ Sj mindimimπ R, dimimπ {j} 19 Since π {j} determines a projection of an n r-dimensional space into an n r 1-dimensional one, we have that dimimπ {j} = n r 1 2 and since dim[] R = dimkerπ R, we have that dimimπ R = dimc dimkerπ R = k i 21 It follows from 19, 2 and 21 that dimimπ Sj mink i, n r 1 22 and equations 18 and 22 together imply dim[] Sj k mink i, n r 1 = maxi, k + r + 1 n The next Propositions will be usen the proof of our new bounds in Theorem 44 and follows easily from Lemma 35 Corollary 36: Given an [n, k] q -linear code C and R n with R = r, then q k n+r Proof: The proof is made by induction on R For the initial step, R =, the result is satisfied since R = Suppose q k n+ R for every R n with R r and let us prove it also holds for J n with J = r + 1 We write J = R {j} with R = r and j / R, and from Lemma 35 it follows that dim[] J = dim[] R {j} maxk + r + 1 n, i with i = dim[] R The induction hypothesis implies that i k n + r hence dim[] J maxk + r + 1 n, k n + r = k n + r + 1 Proposition 37: If r n k + i + 1, then a i r = Proof: Suppose a i r > for some r n k + i + 1, that is, suppose there is a set R n with dim[] R = i and R := r n k + i We cannot have R = n, since this woulmply r = n and i = k, contradicting inequality 23 So, let us assume that R n, so there is j n \ R From Lemma 35 we have that dim[] R {j} maxk + r + 1 n, i and from inequality 23 we have k + r + 1 n i + 2 > i, hence dim[] R {j} i + 2 It follows there is a subcode D [] R {j} with dimd = i+2 and Lemma 31 ensures the existence of a subcode D D such that dim D = i + 1 and supp D R But D []R and dim[] R = i, a contradiction It follows that, for r n k+i+1, there does not exist R n such that R = r and dim[] R = i, in other words, a i r = for r n k + i + 1
5 Corollary 38: a i n 1 = for every i k 1 and a k 1 n 1 = n Proof: Considering r = n 1 = n k + k 1 and i < k 1, Proposition 37 ensures a i n 1 = Proposition 33 it follows that a k n 1 = a k d k 1 = and as a particular case of expression 12 we have that k n a i n 1 =, n 1 and, since a k 1 n 1 is the only non-zero summann the equality above, we have a k 1 n 1 = n n 1 = n IV BOUNDS FOR P In this section, we establish bounds for P by founding bounds for the coefficients Q,r definen equality 13 We start with three lemmas that give us values and bounds for Lemma 41: Let C be an [n, k] q -linear code and let D C be an i-dimensional linear subcode of C If suppd R n, then q i Proof: Since D [] R, we have that D = q i Lemma 42: Let C be an [n, k] q -linear code If R = suppd and D A i, then = q i Proof: From item iii in Proposition 21 we know that [] R is a vector subspace of F n q and hence is a power of q We assume that q i+1 and this will lead us to a contradiction But q i+1 implies dim[] R i + 1 hence there is a subspace D [] R with dimd = i + 1 From D [] R it follows that hence suppd supp[] R R +1 suppd supp[] R H = But this contradicts the fact < +1, ensured by the Monotonicity Theorem Section II-B So we have that q i and Lemma 41 ensures = q i In the previous lemma we considered a subset R n that is the support of a subcode D A i realizing the i-th weight In the following proposition we assume that R = but R suppd for any D realizing the i-th weight Lemma 43: Let C be an [n, k] q -linear code If R n satisfies R = but R suppd for any D A i, then q i 1 Proof: Suppose q i, or equivalently, dim[] R i In this case, there is an i-dimensional D [] R of C such that suppd R and suppd supp[] R R =, where the first inequality follows from the minimality of Then we have suppd = R, dimd = i and suppd =, contradicting the hypothesis that R suppd for any D A i So, < q i and we get q i 1 Now we are able to establish bounds for P C This will be done in the next theorem, that actually establish upper and lower bounds for some of the coefficients Q,j in expression 8 Theorem 44 Bounds for P C: Let C be an [n, k] q -linear code Then, a For every i k, the coefficient Q dec,di is greater or equal to A i 1 1 q + n i A i 1 di 1 ; max{1,q k n+ } b For every i k, the coefficient Q dec,di is smaller or equal to q 1 n A i q i q i 1 ; c For every i 2, k, the coefficient Q amb,di is greater or equal to n A i 1 + A idi 1 max{1, q k n+di } d Q amb,d1 = A 1 d 1 Proof: a To simplify the notation we write: and Φ i = {R n ; R = suppd with D A i } Φ i = {R n ; R = } \ Φ i Using this notation and expression 9, the coefficient Q dec,di is expressed as Q dec,di = R Φ i 1 1 [] R R Φi [] R 24 Lemma 42 ensures that R Φ i implies = q i so Q dec,di R Φ i 1 1 q i + R Φ i 1 1 [] R Corollary 36 ensures that if R Φ i then q k n+di and since we must have 1 1 for it represents a probability, we get that Q dec,di R Φ i 1 1 q + 1 i R Φ i 1 max{1,q k n+ } From Lemma 32 we have that Φ i = A i and since the summands do not depend on R we get that Q dec,di is greater or equal to A i 1 1 q + n i A i 1 di 1 max{1,q k n+ } b From Lemma 43 we can bound q i 1, for R Φ i, and from Lemma 42 we obtain an expression to, for R Φ i Substituting those values in expression 24 we get that Q dec,di A i q 1 q i + n 1 1 q i 1 c From Lemma 42 we have 1 1 = 1 25
6 and, from Corollary 36, max{1, q k n+di } We write the expression 1 as Q dec,di = R Φ i 1 1 [] R R Φi [] R, 27 an substituting it into 25 and 26 we get Q amb,di A i + n A i 1 di 1 28 max{1,q k n+ } d From expression 13 we have that Q amb,d1 = k a i d 1 1 q i From Corollary 34, only two of the summands above are non zero, namely Q amb,d1 = a d 1 1 q + a 1 d 1 1 q 1 = a 1 d 1 1 q 1 and from Proposition 33 we have Q amb,d1 = a 1 d 1 = A 1 d 1 V P AND SEPARABILITY PROPERTIES We start this section presenting some separability properties that generalize the concept of MDS codes and then we will study the behavior of the bounds for P C expressen Theorem 44 for codes having some of those separability properties Using the Singleton bound d 1 C n k + 1 we may define the Singleton defect sc of an [n, k] q -code C as sc = n k + 1 d 1 C Using the defect, we say that a code C is Maximum Distance Separable MDS if sc = and following Boer in [14] C is Almost Maximum Distance Separable MDS if sc = 1 Considering the generalized weights, the separability property of a linear code may be expresses in different but natural ways Considering the monotonicity of the weight hierarchy, the i-th Singleton defect of an [n, k] q -linear code C is defined as s i C = n k + i C We say following Wei in [1] that C is an j-mds code if s j C = and j-amds code if s j C = 1 We say that C is a proper j-mds code or just P j -MDS if it is j-mds and proper in the sense that j = min{i k ; C is an i-mds code} Similarly, we say C is an P j -AMDS code if j = min{i k ; C is an i-amds code} A Expressions for P amb C and P dec C We consider the matrix Λ usen the vectorial form used in Proposition 22 to express the ambiguity or the decoding error probability Propositions 33 and 37 ensures many of the coefficients of Λ T are null Let us write Λ T explicitly as: 1 n d 1 1 n d 1 A 1 d1 A 1 d 1 a d 1+1 a 1 d 1+1 a d k 1 1 a 1 d k 1 1 a d k 1 a 1 d k 1 A k 1 d k 1 Λ T = a d k 1 +1 a 1 d k 1 +1 ak 1 d k 1 +1 a n k a 1 n k a k 1 n k a 1 n k+1 ak 1 n k+1 a k 1 n k+2 a k 1 n 2 n A k d k In this presentation, the blue values are ensured by Proposition 33 and the green entries by Proposition 37 Looking at expression 12, we see it is summing over the lines of Λ T so, in the lines where at most one entry is unknown, we can determine the remaining one using 12: those are the three entries in red Looking now at the columns of Λ T, we see that the quantity of undetermined entries at the column j is given by the difference n k+i and, in an informal way, we can state that the more C is separable, the more the entries of Λ T are known In particular, assuming that C is MDS, that is, that d 1 = n k + 1, the monotonicity of the weights implies that = n k + i for every i k ann this case, all nonzero entries of Λ are expressen terms of the weight spectra, namely, in terms of A 1 d 1, A 2 d 2,, A k d k But for an MDS code, the following theorem due to Han, in [11] gives explicit expressions for those coefficients, depending exclusively on n,k and q: Theorem 51 Theorem 25 in [11]: Let C be an [n, k] q - linear code and suppose that C is P s -MDS Then, for s i k, we have that { A i, if r rc = n r di r t= 1t [ r r+i di t] t i if < r n Using those expressions for A 1 d 1, A 2 d 2,, A k d k we have an alternative proof of the following Theorem already proved by Kasami and Lin in [15]: q,
7 Theorem 52: Let C be an MDS code Then, a P amb C = n i=n k+1 i p i 1 p n i ; b P dec C = n i=n k+1 i 1 1 q p i 1 p i i If C is an AMDS code, that is, if d 1 = n k, there is an unique s := sc k such that C is P s -MDS and we can determine an explicit formula for P C depending only on A 1 d 1 and s: Theorem 53: Let C be an [n, k] q AMDS linear code and let s := sc k such that C is P s -MDS Then, and P amb C =A 1 n kp n k 1 p k n n + p n k+i 1 p k i n k + i s 2 P dec C = + k i=1 A i+1 n k+i n n k + i q 1 q i+1 p n k+i 1 p k i 1 1q i p n k+i 1 p k i Proof: It follows straightforward from the use of the vectorial form 22 and Propositions 33 and 37 We remark that Theorem 53 ensures that, for an AMDS code, the error probability P amb C and P dec C of a code is completely determined by the coefficients A 1 n k and A 1 n k,, As 1 n k+s 2 of the spectra-matrix, respectively It follows that bounds for the coefficients of the spectra-matrix leads to bounds for P C In the particular case of an NMDS-code a code C such that d 1 C = n k and d 2 C = n k + 2, the coefficient A 1 n k fully determines P C and an upper bound for this coefficient is provided Dodunekov e Landgev, in [16]: A 1 n k n q 1 k 1 k B Behavior of P for small p and optimality of MDS and AMDS codes As expected, for small overall error probability p, minimizing error probability P C demands to maximize d 1 C: Proposition 54: Let C 1 and C 2 be two [n, k] q -linear codes For p sufficiently small, if d 1 C 1 > d 1 C 2 then P C 1 < P C 2 Proof: To prove the proposition we assume d 1 C 1 > d 1 C 2 and show that P C 1 p P C 2 = But P C 1 p P C 2 = p = p i=d 1C 1 Q,iC 1 p i 1 p n i j=d 1C 2 Q,jC 2 p j 1 p n j i=d 1C 1 Q,iC 1 p 1 p j=d 1C 2 Q,jC 2 p 1 p i j, where the first equality follows from equation 8 Denoting x = p 1 p and noting that p p 1 p = we get that P C 1 x P C 2 = i=d Q 1C 1,iC 1 x i x j=d Q 1C 2,jC 2 x j d1c 2 i=d = Q 1C 1 d 1C 2,i+d 1C 2C 1 x i x d1c 2 j= Q,j+d1C 2C 2 x j and since we are assuming d 1 C 1 d 1 C 2 >, we have that P C 1 x P C 2 = < 1 and from continuity of the functions we have that P C1 P < 1, C 2 or equivalently P C 1 < P C 2, for every p sufficiently small If for a given pair n, k there exist an MDS AMDS [n, k] q code, we say that n, k is q-mds q-amds As an immediate consequence of Proposition 54 we have the following proposition already known and proven [13]: Proposition 55: If n, k is q-mds and C is an [n, k] q -code that minimizes the error probability, then C is MDS Pairs that are q-mds are not very frequent For q = 2, for example, it is well known that MDS-codes are rather trivial and the unique 2-MDS pairs are the pairs n, n, n, 1, n,, n, n 1 Considering AMDS codes, those are not classified, but there are many constructions of particular families of AMDS codes and results ensuring the existences of such codes with parameters n and k see for example [14] In all those cases, when the pair n, k is AMDS but not MDS, for p sufficiently small, a code that minimizes P should be an AMDS code From Proposition 54 we know that, for p sufficiently small, we should look for codes having maximal minimal distance Among all those codes, which should perform better? A partial answer is given by the next two results and can be summarized as follows: maximize the minimal distance and then minimize the corresponding value in the spectra Proposition 56: Let C 1 and C 2 be two [n, k] q -linear codes with d 1 C 1 = d 1 C 2 If Q,d1C 1 < Q,d1C 2, then P C 1 < P C 2, for p sufficiently small Proof: From equation 8 we get that i=d Q 1C 1,iC 1 x i i=d Q 1C 2,iC 2 x i P C 1 x P C 2 = x We write d 1 = d 1 C 1 = d 1 C 2 and cancel x d from the right side we get P C 1 x P C 2 = Q,d1 C 1 + i=d Q 1+1,iC 1 x i d1 x Q,d1 C 2 + i=d Q 1+1,iC 2 x i d1 = Q,d 1 C 1 Q,d1 C 2 < 1 hence P C 1 < P C 2 for every p sufficiently small Proposition 57: Let C 1 and C 2 be two [n, k] q -linear codes with d 1 C 1 = d 1 C 2 If A 1 d 1 C 1 < A 1 d 1 C 2, then P C 1 < P C 2, for p sufficiently small Proof: It follows straightforward from Proposition 56 and items b and d of Theorem 44
8 VI CONCLUSION In this work we used the generalized weights and spectra to set new bounds for the error probability over an erasure channel Further work may be done exploring the situation when two codes have the same minimal distance and this is attained by the same number of vectors The role of generalized weights and spectra for the error probability still needs to be explained for other channels ACKNOWLEDGMENT This work was partially supported by CAPES and FAPESP grants 27/ and 213/9493- REFERENCES [1] V K Wei, Generalized hamming weights for linear codes, Information Theory, IEEE Transactions on, vol 37, no 5, pp , 1991 [2] H Stichtenoth and C Voss, Generalized hamming weights of trace codes, Information Theory, IEEE Transactions on, vol 4, no 2, pp , 1994 [3] G Feng, K Tzeng, and V Wei, On the generalized hamming weights of several classes of cyclic codes, Information Theory, IEEE Transactions on, vol 38, no 3, pp , 1992 [4] C Munuera, On the generalized hamming weights of geometric goppa codes, Information Theory, IEEE Transactions on, vol 4, no 6, pp , 1994 [5] A Barbero and C Munuera, The weight hierarchy of hermitian codes, SIAM Journal on Discrete Mathematics, vol 13, no 1, pp 79 14, 2 [Online] Available: [6] H Georg Schaathun, The weight hierarchy of product codes, Information Theory, IEEE Transactions on, vol 46, no 7, pp , 2 [7] P Heijnen and R Pellikaan, Generalized hamming weights of q-ary reed-muller codes, Information Theory, IEEE Transactions on, vol 44, no 1, pp , 1998 [8] T Klove, Weight hierarchies of binary linear codes of dimension 4, in Information Theory, 1993 Proceedings 1993 IEEE International Symposium on, 1993, pp [9] J Hirschfeld, M Tsfasman, and S Vladut, The weight hierarchy of higher dimensional hermitian codes, Information Theory, IEEE Transactions on, vol 4, no 1, pp , 1994 [1] A Ashikhmin, A Barg, and S Litsyn, New upper bounds on generalized weights, Information Theory, IEEE Transactions on, vol 45, no 4, pp , 1999 [11] S T D S Han, Higher weights and generalized mds codes, J Korean Math Soc, vol 47, no 6, pp , 21 [12] F Didier, A new upper bound on the block error probability after decoding over the erasure channel, Information Theory, IEEE Transactions on, vol 52, no 1, pp , 26 [13] S Fashandi, S Gharan, and A Khandani, Coding over an erasure channel with a large alphabet size, in Information Theory, 28 ISIT 28 IEEE International Symposium on, 28, pp [14] M A de Boer, Almost mds codes, Designs, Codes and Cryptography, vol 9, no 2, pp , 1996 [15] T Kasami and S Lin, On the probability of undetected error for the maximum distance separable codes, Communications, IEEE Transactions on, vol 32, no 9, pp , 1984 [16] S Dodunekov and I Landgev, On near-mds codes, Journal of Geometry, vol 54, no 1-2, pp 3 43, 1995 [Online] Available:
Matrix characterization of linear codes with arbitrary Hamming weight hierarchy
Linear Algebra and its Applications 412 (2006) 396 407 www.elsevier.com/locate/laa Matrix characterization of linear codes with arbitrary Hamming weight hierarchy G. Viswanath, B. Sundar Rajan Department
More informationDuality for poset codes
Allan O. Moura Marcelo Firer State University of Campinas Fq9 - UCD, July 13-17 2009 Outline 1 Basic definitions 2 3 Outline Basic Definitions 1 Basic definitions 2 3 Notation Basic Definitions [n] = {1,2,...,n}
More informationArrangements, matroids and codes
Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde
More informationRefined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth s second tower
Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth s second tower arxiv:5.0630v [cs.it] 9 Nov 05 Olav Geil, Stefano Martin, Umberto Martínez-Peñas, Diego Ruano Abstract Asymptotically
More informationSupport weight enumerators and coset weight distributions of isodual codes
Support weight enumerators and coset weight distributions of isodual codes Olgica Milenkovic Department of Electrical and Computer Engineering University of Colorado, Boulder March 31, 2003 Abstract In
More informationAlgebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding.
Linear December 2, 2011 References Linear Main Source: Stichtenoth, Henning. Function Fields and. Springer, 2009. Other Sources: Høholdt, Lint and Pellikaan. geometry codes. Handbook of Coding Theory,
More informationError-correcting Pairs for a Public-key Cryptosystem
Error-correcting Pairs for a Public-key Cryptosystem Ruud Pellikaan g.r.pellikaan@tue.nl joint work with Irene Márquez-Corbella Code-based Cryptography Workshop 2012 Lyngby, 9 May 2012 Introduction and
More informationLET be the finite field of cardinality and let
128 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 43, NO. 1, JANUARY 1997 An Explicit Construction of a Sequence of Codes Attaining the Tsfasman Vlăduţ Zink Bound The First Steps Conny Voss Tom Høholdt,
More informationDecomposing Bent Functions
2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions
More informationOrthogonal Arrays & Codes
Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible
More informationOn Linear Subspace Codes Closed under Intersection
On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F
More informationOpen Questions in Coding Theory
Open Questions in Coding Theory Steven T. Dougherty July 4, 2013 Open Questions The following questions were posed by: S.T. Dougherty J.L. Kim P. Solé J. Wood Hilbert Style Problems Hilbert Style Problems
More informationOn Cryptographic Properties of the Cosets of R(1;m)
1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract
More informationMATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q
MATH-315201 This question paper consists of 6 printed pages, each of which is identified by the reference MATH-3152 Only approved basic scientific calculators may be used. c UNIVERSITY OF LEEDS Examination
More informationApplications of Algebraic Geometric Codes to Polar Coding
Clemson University TigerPrints All Dissertations Dissertations 5-015 Applications of Algebraic Geometric Codes to Polar Coding Sarah E Anderson Clemson University Follow this and additional works at: https://tigerprintsclemsonedu/all_dissertations
More informationCodewords of small weight in the (dual) code of points and k-spaces of P G(n, q)
Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q) M. Lavrauw L. Storme G. Van de Voorde October 4, 2007 Abstract In this paper, we study the p-ary linear code C k (n, q),
More informationON WEIERSTRASS SEMIGROUPS AND THE REDUNDANCY OF IMPROVED GEOMETRIC GOPPA CODES
ON WEIERSTRASS SEMIGROUPS AND THE REDUNDANCY OF IMPROVED GEOMETRIC GOPPA CODES RUUD PELLIKAAN AND FERNANDO TORRES Appeared in: IEEE Trans. Inform. Theory, vol. 45, pp. 2512-2519, Nov. 1999 Abstract. Improved
More informationA generalization of the Weierstrass semigroup
Journal of Pure and Applied Algebra 207 (2006) 243 260 www.elsevier.com/locate/jpaa A generalization of the Weierstrass semigroup Peter Beelen a,, Nesrin Tutaş b a Department of Mathematics, Danish Technical
More informationRUUD PELLIKAAN, HENNING STICHTENOTH, AND FERNANDO TORRES
Appeared in: Finite Fields and their Applications, vol. 4, pp. 38-392, 998. WEIERSTRASS SEMIGROUPS IN AN ASYMPTOTICALLY GOOD TOWER OF FUNCTION FIELDS RUUD PELLIKAAN, HENNING STICHTENOTH, AND FERNANDO TORRES
More informationCodes for Partially Stuck-at Memory Cells
1 Codes for Partially Stuck-at Memory Cells Antonia Wachter-Zeh and Eitan Yaakobi Department of Computer Science Technion Israel Institute of Technology, Haifa, Israel Email: {antonia, yaakobi@cs.technion.ac.il
More informationIN this paper, we exploit the information given by the generalized
4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 10, OCTOBER 2006 A New Upper Bound on the Block Error Probability After Decoding Over the Erasure Channel Frédéric Didier Abstract Motivated by
More informationRank and Kernel of binary Hadamard codes.
1 Rank and Kernel of binary Hadamard codes. K.T. Phelps, J. Rifà Senior Member IEEE, M. Villanueva Abstract In this paper the rank and the dimension of the kernel for (binary) Hadamard codes of length
More informationSection 3 Error Correcting Codes (ECC): Fundamentals
Section 3 Error Correcting Codes (ECC): Fundamentals Communication systems and channel models Definition and examples of ECCs Distance For the contents relevant to distance, Lin & Xing s book, Chapter
More informationConstructions of digital nets using global function fields
ACTA ARITHMETICA 105.3 (2002) Constructions of digital nets using global function fields by Harald Niederreiter (Singapore) and Ferruh Özbudak (Ankara) 1. Introduction. The theory of (t, m, s)-nets and
More informationCode Based Cryptology at TU/e
Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University Padjadjaran, Bandung, Nov. 6 Institute Technology Bandung, Bandung, Nov. 6 University Gadjah
More informationTwo-point codes on Norm-Trace curves
Two-point codes on Norm-Trace curves C. Munuera 1, G. C. Tizziotti 2 and F. Torres 2 1 Dept. of Applied Mathematics, University of Valladolid Avda Salamanca SN, 47012 Valladolid, Castilla, Spain 2 IMECC-UNICAMP,
More informationMATH 291T CODING THEORY
California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt
More informationZigzag Codes: MDS Array Codes with Optimal Rebuilding
1 Zigzag Codes: MDS Array Codes with Optimal Rebuilding Itzhak Tamo, Zhiying Wang, and Jehoshua Bruck Electrical Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA Electrical
More informationMATH32031: Coding Theory Part 15: Summary
MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,
More informationFUNDAMENTALS OF ERROR-CORRECTING CODES - NOTES. Presenting: Wednesday, June 8. Section 1.6 Problem Set: 35, 40, 41, 43
FUNDAMENTALS OF ERROR-CORRECTING CODES - NOTES BRIAN BOCKELMAN Monday, June 6 2005 Presenter: J. Walker. Material: 1.1-1.4 For Lecture: 1,4,5,8 Problem Set: 6, 10, 14, 17, 19. 1. Basic concepts of linear
More informationCoding problems for memory and storage applications
.. Coding problems for memory and storage applications Alexander Barg University of Maryland January 27, 2015 A. Barg (UMD) Coding for memory and storage January 27, 2015 1 / 73 Codes with locality Introduction:
More informationLecture 2 Linear Codes
Lecture 2 Linear Codes 2.1. Linear Codes From now on we want to identify the alphabet Σ with a finite field F q. For general codes, introduced in the last section, the description is hard. For a code of
More informationA Characterization Of Quantum Codes And Constructions
A Characterization Of Quantum Codes And Constructions Chaoping Xing Department of Mathematics, National University of Singapore Singapore 117543, Republic of Singapore (email: matxcp@nus.edu.sg) Abstract
More informationHigher weight distribution of Linearized Reed-Solomon codes
Higher weight distribution of Linearized Reed-Solomon codes Haode Yan, Yan Liu, Chunlei Liu arxiv:1505.0778v1 [cs.it] 7 May 015 Abstract Let m, d and be ositive integers such that m e, where e = (m,d).
More informationADDITION BEHAVIOR OF A NUMERICAL SEMIGROUP. Maria Bras-Amorós
Séminaires & Congrès 11, 2005, p. 21 28 ADDITION BEHAVIOR OF A NUMERICAL SEMIGROUP by Maria Bras-Amorós Abstract. In this work we study some objects describing the addition behavior of a numerical semigroup
More informationA NICE PROOF OF FARKAS LEMMA
A NICE PROOF OF FARKAS LEMMA DANIEL VICTOR TAUSK Abstract. The goal of this short note is to present a nice proof of Farkas Lemma which states that if C is the convex cone spanned by a finite set and if
More informationLecture 3: Error Correcting Codes
CS 880: Pseudorandomness and Derandomization 1/30/2013 Lecture 3: Error Correcting Codes Instructors: Holger Dell and Dieter van Melkebeek Scribe: Xi Wu In this lecture we review some background on error
More informationGeneralized hashing and applications to digital fingerprinting
Generalized hashing and applications to digital fingerprinting Noga Alon, Gérard Cohen, Michael Krivelevich and Simon Litsyn Abstract Let C be a code of length n over an alphabet of q letters. An n-word
More informationSimplicial complexes, Demi-matroids, Flag of linear codes and pair of matroids
Faculty of Science and Technology Department of Mathematics and Statistics Simplicial complexes, Demi-matroids, Flag of linear codes and pair of matroids Ali Zubair MAT-3900 Master s thesis in Mathematics
More informationON THE ZERO-DIVISOR-CUP-LENGTH OF SPACES OF ORIENTED ISOMETRY CLASSES OF PLANAR POLYGONS. 1. Introduction
ON THE ZERO-DIVISOR-CUP-LENGTH OF SPACES OF ORIENTED ISOMETRY CLASSES OF PLANAR POLYGONS DONALD M. DAVIS Abstract. Using information about the rational cohomology ring of the space M(l 1,..., l n ) of
More informationWelsh s problem on the number of bases of matroids
Welsh s problem on the number of bases of matroids Edward S. T. Fan 1 and Tony W. H. Wong 2 1 Department of Mathematics, California Institute of Technology 2 Department of Mathematics, Kutztown University
More informationEfficient Decoding of Permutation Codes Obtained from Distance Preserving Maps
2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical
More informationAsymptotically good sequences of codes and curves
Asymptotically good sequences of codes and curves Ruud Pellikaan Technical University of Eindhoven Soria Summer School on Computational Mathematics July 9, 2008 /k 1/29 Content: 8 Some algebraic geometry
More informationMATH 291T CODING THEORY
California State University, Fresno MATH 291T CODING THEORY Fall 2011 Instructor : Stefaan Delcroix Contents 1 Introduction to Error-Correcting Codes 3 2 Basic Concepts and Properties 6 2.1 Definitions....................................
More informationMAS309 Coding theory
MAS309 Coding theory Matthew Fayers January March 2008 This is a set of notes which is supposed to augment your own notes for the Coding Theory course They were written by Matthew Fayers, and very lightly
More informationDe Bruijn Cycles for Covering Codes
De Bruijn Cycles for Covering Codes Fan Chung, 1 Joshua N. Cooper 1,2 1 Department of Mathematics, University of California, San Diego, La Jolla, California 92093 2 Courant Institute of Mathematical Sciences,
More informationHomological Methods in Commutative Algebra
Homological Methods in Commutative Algebra Olivier Haution Ludwig-Maximilians-Universität München Sommersemester 2017 1 Contents Chapter 1. Associated primes 3 1. Support of a module 3 2. Associated primes
More informationLinear Codes, Target Function Classes, and Network Computing Capacity
Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:
More informationGroups of Prime Power Order with Derived Subgroup of Prime Order
Journal of Algebra 219, 625 657 (1999) Article ID jabr.1998.7909, available online at http://www.idealibrary.com on Groups of Prime Power Order with Derived Subgroup of Prime Order Simon R. Blackburn*
More information2012 IEEE International Symposium on Information Theory Proceedings
Decoding of Cyclic Codes over Symbol-Pair Read Channels Eitan Yaakobi, Jehoshua Bruck, and Paul H Siegel Electrical Engineering Department, California Institute of Technology, Pasadena, CA 9115, USA Electrical
More informationConstructing Critical Indecomposable Codes
Constructing Critical Indecomposable Codes Judy L. Walker 1 Abstract Critical indecomposable codes were introduced by Assmus [1], who also gave a recursive construction for these objects. One of the key
More informationMATH3302. Coding and Cryptography. Coding Theory
MATH3302 Coding and Cryptography Coding Theory 2010 Contents 1 Introduction to coding theory 2 1.1 Introduction.......................................... 2 1.2 Basic definitions and assumptions..............................
More informationORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES
ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES ANDRIES E. BROUWER, ARJEH M. COHEN, MAN V.M. NGUYEN Abstract. All mixed (or asymmetric) orthogonal arrays of strength 3 with run size at most 64 are
More information11 Minimal Distance and the Parity Check Matrix
MATH32031: Coding Theory Part 12: Hamming Codes 11 Minimal Distance and the Parity Check Matrix Theorem 23 (Distance Theorem for Linear Codes) Let C be an [n, k] F q -code with parity check matrix H. Then
More informationOn the Infinitude of Twin-Primes Bao Qi Feng
On the Infinitude of Twin-Primes Bao Qi Feng Department of Mathematical Sciences, Kent State University at Tuscarawas 330 University Dr. NE, New Philadelphia, OH 44663, USA. Abstract In this article, we
More informationRIEMANN SURFACES. max(0, deg x f)x.
RIEMANN SURFACES 10. Weeks 11 12: Riemann-Roch theorem and applications 10.1. Divisors. The notion of a divisor looks very simple. Let X be a compact Riemann surface. A divisor is an expression a x x x
More informationCAYLEY-BACHARACH AND EVALUATION CODES ON COMPLETE INTERSECTIONS
CAYLEY-BACHARACH AND EVALUATION CODES ON COMPLETE INTERSECTIONS LEAH GOLD, JOHN LITTLE, AND HAL SCHENCK Abstract. In [9], J. Hansen uses cohomological methods to find a lower bound for the minimum distance
More informationMTH6108 Coding theory
MTH6108 Coding theory Contents 1 Introduction and definitions 2 2 Good codes 6 2.1 The main coding theory problem............................ 6 2.2 The Singleton bound...................................
More informationA Lifting Decoding Scheme and its Application to Interleaved Linear Codes
Author manuscript, published in "International Symposium on Information Theory (2012) 96-100" DOI : 10.1109/ISIT.2012.6284707 A Lifting Decoding Scheme and its Application to Interleaved Linear Codes Guillaume
More informationMinimum-Distance Based Construction of Multi-Kernel Polar Codes
Minimum-Distance Based Construction of Multi-Kernel Polar Codes Valerio Bioglio, Frédéric Gabry, Ingmar Land, Jean-Claude Belfiore Mathematical and Algorithmic Sciences Lab France Research Center, Huawei
More informationOn Locating-Dominating Codes in Binary Hamming Spaces
Discrete Mathematics and Theoretical Computer Science 6, 2004, 265 282 On Locating-Dominating Codes in Binary Hamming Spaces Iiro Honkala and Tero Laihonen and Sanna Ranto Department of Mathematics and
More informationCover Page. The handle holds various files of this Leiden University dissertation
Cover Page The handle http://hdl.handle.net/1887/57796 holds various files of this Leiden University dissertation Author: Mirandola, Diego Title: On products of linear error correcting codes Date: 2017-12-06
More informationError Correcting Codes Questions Pool
Error Correcting Codes Questions Pool Amnon Ta-Shma and Dean Doron January 3, 018 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to
More informationOn the floor and the ceiling of a divisor
Finite Fields and Their Applications 12 (2006) 38 55 http://www.elsevier.com/locate/ffa On the floor and the ceiling of a divisor Hiren Maharaj, Gretchen L. Matthews 1 Department of Mathematical Sciences,
More informationSphere Packing and Shannon s Theorem
Chapter 2 Sphere Packing and Shannon s Theorem In the first section we discuss the basics of block coding on the m-ary symmetric channel. In the second section we see how the geometry of the codespace
More informationArbitrary Alphabet Size
Optimal Coding for the Erasure Channel with Arbitrary Alphabet Size Shervan Fashandi, Shahab Oveis Gharan and Amir K. Khandani ECE Dept., University of Waterloo, Waterloo, O, Canada, 2L3G email: {sfashand,shahab,khandani}@cst.uwaterloo.ca
More informationOn the Polarization Levels of Automorphic-Symmetric Channels
On the Polarization Levels of Automorphic-Symmetric Channels Rajai Nasser Email: rajai.nasser@alumni.epfl.ch arxiv:8.05203v2 [cs.it] 5 Nov 208 Abstract It is known that if an Abelian group operation is
More informationChapter 3 Linear Block Codes
Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and
More informationFeedback Capacity of a Class of Symmetric Finite-State Markov Channels
Feedback Capacity of a Class of Symmetric Finite-State Markov Channels Nevroz Şen, Fady Alajaji and Serdar Yüksel Department of Mathematics and Statistics Queen s University Kingston, ON K7L 3N6, Canada
More information: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane
2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and
More informationLIMITING CASES OF BOARDMAN S FIVE HALVES THEOREM
Proceedings of the Edinburgh Mathematical Society Submitted Paper Paper 14 June 2011 LIMITING CASES OF BOARDMAN S FIVE HALVES THEOREM MICHAEL C. CRABB AND PEDRO L. Q. PERGHER Institute of Mathematics,
More informationFRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES
FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES ANDRIES E. BROUWER, ARJEH M. COHEN, MAN V.M. NGUYEN Abstract. All mixed (or asymmetric) orthogonal arrays of strength 3 with run size at most
More informationReed-Solomon codes. Chapter Linear codes over finite fields
Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime
More informationMAXIMUM NUMBER OF COMMON ZEROS OF HOMOGENEOUS POLYNOMIALS OVER FINITE FIELDS PETER BEELEN, MRINMOY DATTA, AND SUDHIR R. GHORPADE
Peter Beelen, Mrinmoy Datta, Sudhir R Ghorpade Maximum number of common zeros of homogeneous polynomials over finite fields Proceedings of the American Mathematical Society DOI: 10.1090/proc/13863 Accepted
More informationAsymptotically good sequences of curves and codes
Asymptotically good sequences of curves and codes Ruud Pellikaan Appeared in in Proc 34th Allerton Conf on Communication, Control, and Computing, Urbana-Champaign, October 2-4, 1996, 276-285 1 Introduction
More informationHonors Algebra 4, MATH 371 Winter 2010 Assignment 4 Due Wednesday, February 17 at 08:35
Honors Algebra 4, MATH 371 Winter 2010 Assignment 4 Due Wednesday, February 17 at 08:35 1. Let R be a commutative ring with 1 0. (a) Prove that the nilradical of R is equal to the intersection of the prime
More informationChapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005
Chapter 7 Error Control Coding Mikael Olofsson 2005 We have seen in Chapters 4 through 6 how digital modulation can be used to control error probabilities. This gives us a digital channel that in each
More informationCombinatória e Teoria de Códigos Exercises from the notes. Chapter 1
Combinatória e Teoria de Códigos Exercises from the notes Chapter 1 1.1. The following binary word 01111000000?001110000?00110011001010111000000000?01110 encodes a date. The encoding method used consisted
More informationA Tight Rate Bound and Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures
1 A Tight Rate Bound and Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures arxiv:181050v1 [csit] 6 Dec 018 S B Balaji, Ganesh R Kini and
More informationarxiv: v2 [math.gr] 22 Aug 2016
THEORY OF DISGUISED-GROUPS EDUARDO BLANCO GÓMEZ arxiv:1607.07345v2 [math.gr] 22 Aug 2016 Abstract. In this paper we define a new algebraic object: the disguised-groups. We show the main properties of the
More informationCryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes
Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes Alain Couvreur, Irene Márquez-Corbella and Ruud Pellikaan Abstract We give a polynomial time attack on the McEliece
More informationAn upper bound on l q norms of noisy functions
Electronic Collouium on Computational Complexity, Report No. 68 08 An upper bound on l norms of noisy functions Alex Samorodnitsky Abstract Let T ɛ, 0 ɛ /, be the noise operator acting on functions on
More informationEstimates of the Distance Distribution of Codes and Designs
1050 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 Estimates of the Distance Distribution of Codes Designs Alexei Ashikhmin, Member, IEEE, Alexer Barg, Senior Member, IEEE, Simon
More informationMulti-Kernel Polar Codes: Proof of Polarization and Error Exponents
Multi-Kernel Polar Codes: Proof of Polarization and Error Exponents Meryem Benammar, Valerio Bioglio, Frédéric Gabry, Ingmar Land Mathematical and Algorithmic Sciences Lab Paris Research Center, Huawei
More informationBounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel
Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel Ohad Barak, David Burshtein and Meir Feder School of Electrical Engineering Tel-Aviv University Tel-Aviv 69978, Israel Abstract
More informationON PERTURBATION OF BINARY LINEAR CODES. PANKAJ K. DAS and LALIT K. VASHISHT
Math Appl 4 (2015), 91 99 DOI: 1013164/ma201507 ON PERTURBATION OF BINARY LINEAR CODES PANKAJ K DAS and LALIT K VASHISHT Abstract We present new codes by perturbation of rows of the generating matrix of
More informationError control of line codes generated by finite Coxeter groups
Error control of line codes generated by finite Coxeter groups Ezio Biglieri Universitat Pompeu Fabra, Barcelona, Spain Email: e.biglieri@ieee.org Emanuele Viterbo Monash University, Melbourne, Australia
More informationCourse 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra
Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra D. R. Wilkins Contents 3 Topics in Commutative Algebra 2 3.1 Rings and Fields......................... 2 3.2 Ideals...............................
More information3. Coding theory 3.1. Basic concepts
3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,
More informationLIFTED CODES OVER FINITE CHAIN RINGS
Math. J. Okayama Univ. 53 (2011), 39 53 LIFTED CODES OVER FINITE CHAIN RINGS Steven T. Dougherty, Hongwei Liu and Young Ho Park Abstract. In this paper, we study lifted codes over finite chain rings. We
More informationA proof of the Jordan normal form theorem
A proof of the Jordan normal form theorem Jordan normal form theorem states that any matrix is similar to a blockdiagonal matrix with Jordan blocks on the diagonal. To prove it, we first reformulate it
More informationLecture 12. Block Diagram
Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data
More informationNumerical Sequences and Series
Numerical Sequences and Series Written by Men-Gen Tsai email: b89902089@ntu.edu.tw. Prove that the convergence of {s n } implies convergence of { s n }. Is the converse true? Solution: Since {s n } is
More informationLINEAR ALGEBRA: THEORY. Version: August 12,
LINEAR ALGEBRA: THEORY. Version: August 12, 2000 13 2 Basic concepts We will assume that the following concepts are known: Vector, column vector, row vector, transpose. Recall that x is a column vector,
More informationOn the properness of some optimal binary linear codes and their dual codes
Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 76-81 On the properness of some optimal binary linear codes and their dual codes Rossitza
More informationThe minimum distance of codes in an array coming from telescopic semigroups
The minimum distance of codes in an array coming from telescopic semigroups Christoph Kirfel and Ruud Pellikaan in IEEE Transactions Information Theory, vol. 41, pp. 1720 1732, (1995) Abstract The concept
More informationSecurity in Locally Repairable Storage
1 Security in Locally Repairable Storage Abhishek Agarwal and Arya Mazumdar Abstract In this paper we extend the notion of locally repairable codes to secret sharing schemes. The main problem we consider
More informationNotes for Math 290 using Introduction to Mathematical Proofs by Charles E. Roberts, Jr.
Notes for Math 290 using Introduction to Mathematical Proofs by Charles E. Roberts, Jr. Chapter : Logic Topics:. Statements, Negation, and Compound Statements.2 Truth Tables and Logical Equivalences.3
More informationWhere is matrix multiplication locally open?
Linear Algebra and its Applications 517 (2017) 167 176 Contents lists available at ScienceDirect Linear Algebra and its Applications www.elsevier.com/locate/laa Where is matrix multiplication locally open?
More informationCYCLIC SIEVING FOR CYCLIC CODES
CYCLIC SIEVING FOR CYCLIC CODES ALEX MASON, VICTOR REINER, SHRUTHI SRIDHAR Abstract. These are notes on a preliminary follow-up to a question of Jim Propp, about cyclic sieving of cyclic codes. We show
More information