Generalized weights and bounds for error probability over erasure channels

Size: px
Start display at page:

Download "Generalized weights and bounds for error probability over erasure channels"

Transcription

1 Generalized weights and bounds for error probability over erasure channels Leandro Cruvinel Lemes Department of Electrical Engineering Federal University of Triangulo Mineiro Uberaba - MG, Brazil leandro@icteuftmedubr Marcelo Firer Department of Mathematics State University of Campinas Campinas - SP, Brazil mfirer@imeunicampbr Abstract New upper and lower bounds for the error probability over an erasure channel are provided, making use of Wei s generalized weights, hierarchy and spectra In many situations the upper and lower bounds coincide and this allows us to improve the existing bounds Results concerning MDS and AMDS codes are deduced from those bounds I INTRODUCTION Generalized weights of a linear code were introduced by Victor Wei in [1] and became relevant invariants in Coding Theory, being determined for particular classes of codes [2], [3], [4], [5], [6], [7], [8], [9] and bounded when explicit formulas are not available [1], [11] However, the importance of those invariants concerning one of the main problems of Coding Theory - estimating the efficiency of a code in terms of errors correction - has not yet been properly explored In this work, we consider a q-ary erasure channel and give an expression for the error probability Proposition 22 that separates the variables of the problem namely, the code and the channel, where for error probability we mean either ambiguity probability or the decoding error s probability Considering the hierarchy and spectra of generalized weights, we are able to get new bounds for the error probability of linear codes Theorem 44 It turns out that, in many cases, the upper bounds for ambiguity are better then the ones determined by Didier in [12] and the lower bound better then those determined by Fashandi et al in [13], where the authors are concerned mainly with codes over large alphabets In the last section V we consider separation properties MDS and generalizations, we show that for MDS and AMDS codes the upper and lower bounds obtained for error probability collapse, becoming hence an exact expression for the error probability, what was already known to Fashandi et al [13] in the MDS case and conclude by showing the minimizing role of MDS and AMDS codes when considering and overall error probability sufficiently small A Erasure Channel II BASIC DEFINITIONS AND NOTATION In this work we consider a Discrete Erasure Channels DEC defined by an input alphabet X = F q finite field with q elements, an output alphabet Y = F q {ɛ} where ɛ / F q is called the erasure symbol and a probability function P i j := Pr [Y = j X = i] defined by: a P j i =, for i j and {i, j} X ; b P i i = 1 p, for π 1; c P ɛ i = p, for i X, The constant < p < 1/2 is called the overall error probability of the channel A Discrete Memoryless Erasure Channels DMEC is obtained by defining n P y x = P yl x l, 1 l=1 where, x = x 1, x 2,, x n X n and y = y 1, y 2,, y n Y n B Generalized weights Given integers r, s Z with r < s, we denote r, s := {r, r + 1,, s 1, s} For simplicity, we write n := 1, n Let C F n q be an [n, k] q -linear code Since in this work we will consider only linear codes, this adjective may be omitted Given x F n q, the support of x is suppx = {i n ; with x i } and the Hamming distance may be expressed as dx, x = suppx x, where A denotes the cardinality of A Given a subcode D C, the support of D is defined as suppd = suppx x D and the generalized weight C of D is defined as C = min{ suppd ; D C and dim D = i}, for i k It is well known Wei s Theorem [1] that the generalized weights are strictly increasing d 1 C < d 2 C < < d k C and we call {d 1 C, d 2 C,, d k C} the weight hierarchy of C We denote by A i j = Ai j C, i k and j n, the set of all i-dimensional linear subcodes D C supported by j coordinates, that is, A i jc = {D C; suppd = j and dim D = i}

2 The cardinality of A i j is called the i-th generalized spectra with support j of the code C and we denote A i j = A i j We call the matrix A i j the code C Ambiguity,,k;j=, n the spectra-matrix of Considering a code C F n q and a DMEC, some messages in Y n will never be received We denote by E C the subset of messages that may be received, that is, E C = {y Y n ; P receive y } and call it the set of admissible or possible messages, where P receive y is the probability to receive y Y n Given x X n, we denote by P send x the priori probability of x so that n E C = {y Y n ; x C with P send x P yl x l } Given y Y n let R := Ry = {i n ; y i = ɛ} and define the set [y] R of R-ambiguities of y as l=1 [y] R := {x C; P y x } We note that [y] R depends both on y and C We remark that, when using a Maximum Likelihood decoder, once the message y is received, the elements of [y] R are the possible choices for decoding y We say that y is an ambiguity of C if [y] R > 1 We identify F n q with the product Π n i=1 F q i and, given R n, we denote by π R the projection of x = x i i n in the coordinates of R: π R x = x i i R To shorten the notation we will write π R x = x R We also denote by E R the set of admissible messages that has an erasure on the coordinates in R, that is, E R = {y E C ; y i = ɛ, i R} Given R n let R := {i n ; i / R} be the complement of R The following proposition consists of a sequence of elementary properties that are stated without a proof for future reference Proposition 21: Considering a DMEC, y Y n, R n and C a linear code, we have that i [y] R = iff y / E C ; i [y] R = {x C; x R = y R}; iii [] R is the kernel of the projection map π R restricted to the code C; iv For any y E C, [y] R = [ R ] ; v E R = q k 1 D Error probability for ambiguity and decoding We are considering an DMEC with conditional probabilities defined by 1, with overall error probability p and prior probabilities identically distributed, that is, P i = q 1, i F q Given y Y n we denote by P receive y the probability that y is received and by P amb y the probability that y is ambiguous The ambiguity probability of an [n, k] q -code C or the error probability before decoding procedures is P amb C = P amb yp receive y y Y n = P amb yp receive y, y E C where the last equality follows from statement i in Proposition 21 Considering a maximum likelihood decoding criteria, we denote by P dec y the probability of y Y n being decoded incorrectly and define the decoding error probability of an [n, k] q -code C as P dec C = y Y n P dec yp receive y = y E C P dec yp receive y, where the last equality again follows from statement i in Proposition 21 We will use P C to denote either P amb C or P dec C, that is, we may consider to mean either dec or amb, so that both the previous expressions may be written as P C = y E C P yp receive y 2 Since we are assuming that P i = q 1, i F q, the probability that a message y is receives P receive y = x C P y xp send x = 1 q k x C P y x Considering an admissible message y E C, we have P receive y = x [] R q k p R 1 p R 3 = q k p R 1 p R 4 Substituting expression 3 into equation 2 we get P C = y E C P yq k p R 1 p R, 5 hence we may write 5 as P C = P y E H q k p R 1 p R R n

3 and, from statement v in Proposition 21 it follows that P C = P Rp R 1 p R 6 R n We note that we are exchanging P y by P R and this is possible since those probabilities do not depend on y but only at what are the erased coordinates of y, that is, on the set Denoting we may write 6 as We note that R = Ry = {i n ; y i = ɛ} Q,r = P C = Q dec,r = Q amb,r = R; R =r P R, 7 n Q,r p r 1 p n r 8 r= {R n ; R =r} {R n ; R =r} where α is the smallest integer greater or equal to α R In our case, we have that 1 1 { if []R = 1; = 1 if > 1, that is, it equals 1 or according if there is more then one or only one namely y admissible messages having R as a set of ambiguous coordinates We define a i r := a i rc = {R n ; R = r and dim[] R = i} 11 and { 1 1 q, for = dec; δ,i = 1 i 1q, for = amb i We note that each a i r depends on the code C, since [] R is the kernel of the projection π R restricted to C We also remark that k n a i r = 12 r With this notation we have that k Q,r = a i rδ,i 13 so that equation 6 may be expressen a vectorial form: Proposition 22: The ambiguity probability and the decoding error probability of a linear code may be expressed as the product P C = δ Λρ T 14 where δ = δ,,, δ,k, ρ = 1 p n, p1 p n 1,, p n, ρ T is the transpose of the vector ρ and a a 1 a n Λ = 15 a k a k 1 a k n We remark that δ depends only on the the parameters [n, k] q and on meaning decoding or ambiguity ; ρ depends only at the channel not on the code; the matrix Λ depends only on the code C, not on the channel neither on meaning decoding or ambiguity For this reason, since only Λ depends on the code C, when looking for bounds, we will focus the attention on this matrix, which we call the supportmatrix of C III SUPPORT-MATRIX AND SPECTRA-MATRIX OF A CODE In this section and from here on, we will assume that d k = n We wish to establish a relation between the support-matrix and the spectra-matrix of a code and we start with two simple lemmas Lemma 31: Let C be a code, D A i rc and s n Then, D contains a set of linearly independent vectors {x 1,, x i 1 } D such that π s x j =, for any j i 1 Proof: Let R = suppd and let us assume first that s / R But this implies that π {s} x =, for every x D and the result follows from the fact that dimd = i Let us now assume that s R Since R = suppd, there is x D such that π {s} x We consider a basis of the subspace D containing x, let us say {x, u 1, u i 1 } We define x j = u j π su j π s x x ant is immediate to check that {x 1,, x i 1 } is linearly independent and π s x j =, for any j i 1 Lemma 32: For every i k the coefficient A i of the spectra-matrix depends on the number of different supports attained by subcodes in A i, that is, A i = {R; R = supp D and D A i } Proof: It is enough to prove that for D 1, D 2 A i, if D 1 D 2, then supp D 1 supp D 2 For D 1 D 2 we may assume wlog there is x D 2 \ D 1 We suppose suppd 1 = suppd 2 = R and will show that this leads to a contradiction Since x D 2 \ D 1, the subspace D = {x} D 1 has dimension i + 1 and since suppx suppd 1 = R, we have that suppd = R and, from Lemma 31, given s R there is a linearly independent set {x 1,, x i } D such that π {s} x j =, j i Denoting D = x 1,, x i we have that dim D = i and supp D R \ {s}, that is, supp D <, a contradiction We are now able to determine a i r = for r :

4 Proposition 33: For any i = 1, k, the coefficients of the support-matrix of a code C satisfy { for r < a i di ; r = A i for r = Proof: We first consider the case r = If we put B = {R n ; dim [] R = i and R = } we have, by definition, that B = a i It follows from Lemma 32 that we only need to prove that B = {R; R = supp D and D A i } Let us consider R n with dim[] R = i and R = and let us prove that supp[] R = R We know that supp[] R R and we can not have supp[] R > R Since dim[] H = i and supp[] R R =, it follows that supp[] R = R hence a i = A i We consider now the case r < Given r <, suppose that a i r > This implies there is R n with R = r and dim[] R = i But supp[] R R and this implies r = R supp[] R, a contradiction It follows that a i r =, for all r < We remark that the condition r = is strictly necessary in Proposition 33 Considering for example the [3, 2] 2 -code generated by the vectors {1,,,, 1, 1} for r = 2 and d 2 = 3 we have that A 1 2 = 1 and a 1 2 = 3 Wei s Monotonicity Theorem states that i < j implies < d j, so Proposition 33 ensures the following: Corollary 34: If j < i then a i d j = We continue with some results that will be used to produce the expected bounds for the error probability Lemma 35: Let R n, with R = r an = dim[] R Then, for any j n \ R we have that dim[] R {j} maxk + r + 1 n, i 16 Proof: Denoting S j = R {j}, from item iii in Proposition 21 we have [] Sj = kerπ Sj Considering that may be expressed as the composition π Sj of the projections π Sj = π {j} π R 17 π π R C F n r {j} q F n r 1 q s n c se s s R c se s s S j c s e s, the classical Kernel Theorem ensures that that is, dimc = dimimπ Sj + dimkerπ Sj, But equation 17 implies dim [] Sj = k dimimπ Sj 18 dimimπ Sj mindimimπ R, dimimπ {j} 19 Since π {j} determines a projection of an n r-dimensional space into an n r 1-dimensional one, we have that dimimπ {j} = n r 1 2 and since dim[] R = dimkerπ R, we have that dimimπ R = dimc dimkerπ R = k i 21 It follows from 19, 2 and 21 that dimimπ Sj mink i, n r 1 22 and equations 18 and 22 together imply dim[] Sj k mink i, n r 1 = maxi, k + r + 1 n The next Propositions will be usen the proof of our new bounds in Theorem 44 and follows easily from Lemma 35 Corollary 36: Given an [n, k] q -linear code C and R n with R = r, then q k n+r Proof: The proof is made by induction on R For the initial step, R =, the result is satisfied since R = Suppose q k n+ R for every R n with R r and let us prove it also holds for J n with J = r + 1 We write J = R {j} with R = r and j / R, and from Lemma 35 it follows that dim[] J = dim[] R {j} maxk + r + 1 n, i with i = dim[] R The induction hypothesis implies that i k n + r hence dim[] J maxk + r + 1 n, k n + r = k n + r + 1 Proposition 37: If r n k + i + 1, then a i r = Proof: Suppose a i r > for some r n k + i + 1, that is, suppose there is a set R n with dim[] R = i and R := r n k + i We cannot have R = n, since this woulmply r = n and i = k, contradicting inequality 23 So, let us assume that R n, so there is j n \ R From Lemma 35 we have that dim[] R {j} maxk + r + 1 n, i and from inequality 23 we have k + r + 1 n i + 2 > i, hence dim[] R {j} i + 2 It follows there is a subcode D [] R {j} with dimd = i+2 and Lemma 31 ensures the existence of a subcode D D such that dim D = i + 1 and supp D R But D []R and dim[] R = i, a contradiction It follows that, for r n k+i+1, there does not exist R n such that R = r and dim[] R = i, in other words, a i r = for r n k + i + 1

5 Corollary 38: a i n 1 = for every i k 1 and a k 1 n 1 = n Proof: Considering r = n 1 = n k + k 1 and i < k 1, Proposition 37 ensures a i n 1 = Proposition 33 it follows that a k n 1 = a k d k 1 = and as a particular case of expression 12 we have that k n a i n 1 =, n 1 and, since a k 1 n 1 is the only non-zero summann the equality above, we have a k 1 n 1 = n n 1 = n IV BOUNDS FOR P In this section, we establish bounds for P by founding bounds for the coefficients Q,r definen equality 13 We start with three lemmas that give us values and bounds for Lemma 41: Let C be an [n, k] q -linear code and let D C be an i-dimensional linear subcode of C If suppd R n, then q i Proof: Since D [] R, we have that D = q i Lemma 42: Let C be an [n, k] q -linear code If R = suppd and D A i, then = q i Proof: From item iii in Proposition 21 we know that [] R is a vector subspace of F n q and hence is a power of q We assume that q i+1 and this will lead us to a contradiction But q i+1 implies dim[] R i + 1 hence there is a subspace D [] R with dimd = i + 1 From D [] R it follows that hence suppd supp[] R R +1 suppd supp[] R H = But this contradicts the fact < +1, ensured by the Monotonicity Theorem Section II-B So we have that q i and Lemma 41 ensures = q i In the previous lemma we considered a subset R n that is the support of a subcode D A i realizing the i-th weight In the following proposition we assume that R = but R suppd for any D realizing the i-th weight Lemma 43: Let C be an [n, k] q -linear code If R n satisfies R = but R suppd for any D A i, then q i 1 Proof: Suppose q i, or equivalently, dim[] R i In this case, there is an i-dimensional D [] R of C such that suppd R and suppd supp[] R R =, where the first inequality follows from the minimality of Then we have suppd = R, dimd = i and suppd =, contradicting the hypothesis that R suppd for any D A i So, < q i and we get q i 1 Now we are able to establish bounds for P C This will be done in the next theorem, that actually establish upper and lower bounds for some of the coefficients Q,j in expression 8 Theorem 44 Bounds for P C: Let C be an [n, k] q -linear code Then, a For every i k, the coefficient Q dec,di is greater or equal to A i 1 1 q + n i A i 1 di 1 ; max{1,q k n+ } b For every i k, the coefficient Q dec,di is smaller or equal to q 1 n A i q i q i 1 ; c For every i 2, k, the coefficient Q amb,di is greater or equal to n A i 1 + A idi 1 max{1, q k n+di } d Q amb,d1 = A 1 d 1 Proof: a To simplify the notation we write: and Φ i = {R n ; R = suppd with D A i } Φ i = {R n ; R = } \ Φ i Using this notation and expression 9, the coefficient Q dec,di is expressed as Q dec,di = R Φ i 1 1 [] R R Φi [] R 24 Lemma 42 ensures that R Φ i implies = q i so Q dec,di R Φ i 1 1 q i + R Φ i 1 1 [] R Corollary 36 ensures that if R Φ i then q k n+di and since we must have 1 1 for it represents a probability, we get that Q dec,di R Φ i 1 1 q + 1 i R Φ i 1 max{1,q k n+ } From Lemma 32 we have that Φ i = A i and since the summands do not depend on R we get that Q dec,di is greater or equal to A i 1 1 q + n i A i 1 di 1 max{1,q k n+ } b From Lemma 43 we can bound q i 1, for R Φ i, and from Lemma 42 we obtain an expression to, for R Φ i Substituting those values in expression 24 we get that Q dec,di A i q 1 q i + n 1 1 q i 1 c From Lemma 42 we have 1 1 = 1 25

6 and, from Corollary 36, max{1, q k n+di } We write the expression 1 as Q dec,di = R Φ i 1 1 [] R R Φi [] R, 27 an substituting it into 25 and 26 we get Q amb,di A i + n A i 1 di 1 28 max{1,q k n+ } d From expression 13 we have that Q amb,d1 = k a i d 1 1 q i From Corollary 34, only two of the summands above are non zero, namely Q amb,d1 = a d 1 1 q + a 1 d 1 1 q 1 = a 1 d 1 1 q 1 and from Proposition 33 we have Q amb,d1 = a 1 d 1 = A 1 d 1 V P AND SEPARABILITY PROPERTIES We start this section presenting some separability properties that generalize the concept of MDS codes and then we will study the behavior of the bounds for P C expressen Theorem 44 for codes having some of those separability properties Using the Singleton bound d 1 C n k + 1 we may define the Singleton defect sc of an [n, k] q -code C as sc = n k + 1 d 1 C Using the defect, we say that a code C is Maximum Distance Separable MDS if sc = and following Boer in [14] C is Almost Maximum Distance Separable MDS if sc = 1 Considering the generalized weights, the separability property of a linear code may be expresses in different but natural ways Considering the monotonicity of the weight hierarchy, the i-th Singleton defect of an [n, k] q -linear code C is defined as s i C = n k + i C We say following Wei in [1] that C is an j-mds code if s j C = and j-amds code if s j C = 1 We say that C is a proper j-mds code or just P j -MDS if it is j-mds and proper in the sense that j = min{i k ; C is an i-mds code} Similarly, we say C is an P j -AMDS code if j = min{i k ; C is an i-amds code} A Expressions for P amb C and P dec C We consider the matrix Λ usen the vectorial form used in Proposition 22 to express the ambiguity or the decoding error probability Propositions 33 and 37 ensures many of the coefficients of Λ T are null Let us write Λ T explicitly as: 1 n d 1 1 n d 1 A 1 d1 A 1 d 1 a d 1+1 a 1 d 1+1 a d k 1 1 a 1 d k 1 1 a d k 1 a 1 d k 1 A k 1 d k 1 Λ T = a d k 1 +1 a 1 d k 1 +1 ak 1 d k 1 +1 a n k a 1 n k a k 1 n k a 1 n k+1 ak 1 n k+1 a k 1 n k+2 a k 1 n 2 n A k d k In this presentation, the blue values are ensured by Proposition 33 and the green entries by Proposition 37 Looking at expression 12, we see it is summing over the lines of Λ T so, in the lines where at most one entry is unknown, we can determine the remaining one using 12: those are the three entries in red Looking now at the columns of Λ T, we see that the quantity of undetermined entries at the column j is given by the difference n k+i and, in an informal way, we can state that the more C is separable, the more the entries of Λ T are known In particular, assuming that C is MDS, that is, that d 1 = n k + 1, the monotonicity of the weights implies that = n k + i for every i k ann this case, all nonzero entries of Λ are expressen terms of the weight spectra, namely, in terms of A 1 d 1, A 2 d 2,, A k d k But for an MDS code, the following theorem due to Han, in [11] gives explicit expressions for those coefficients, depending exclusively on n,k and q: Theorem 51 Theorem 25 in [11]: Let C be an [n, k] q - linear code and suppose that C is P s -MDS Then, for s i k, we have that { A i, if r rc = n r di r t= 1t [ r r+i di t] t i if < r n Using those expressions for A 1 d 1, A 2 d 2,, A k d k we have an alternative proof of the following Theorem already proved by Kasami and Lin in [15]: q,

7 Theorem 52: Let C be an MDS code Then, a P amb C = n i=n k+1 i p i 1 p n i ; b P dec C = n i=n k+1 i 1 1 q p i 1 p i i If C is an AMDS code, that is, if d 1 = n k, there is an unique s := sc k such that C is P s -MDS and we can determine an explicit formula for P C depending only on A 1 d 1 and s: Theorem 53: Let C be an [n, k] q AMDS linear code and let s := sc k such that C is P s -MDS Then, and P amb C =A 1 n kp n k 1 p k n n + p n k+i 1 p k i n k + i s 2 P dec C = + k i=1 A i+1 n k+i n n k + i q 1 q i+1 p n k+i 1 p k i 1 1q i p n k+i 1 p k i Proof: It follows straightforward from the use of the vectorial form 22 and Propositions 33 and 37 We remark that Theorem 53 ensures that, for an AMDS code, the error probability P amb C and P dec C of a code is completely determined by the coefficients A 1 n k and A 1 n k,, As 1 n k+s 2 of the spectra-matrix, respectively It follows that bounds for the coefficients of the spectra-matrix leads to bounds for P C In the particular case of an NMDS-code a code C such that d 1 C = n k and d 2 C = n k + 2, the coefficient A 1 n k fully determines P C and an upper bound for this coefficient is provided Dodunekov e Landgev, in [16]: A 1 n k n q 1 k 1 k B Behavior of P for small p and optimality of MDS and AMDS codes As expected, for small overall error probability p, minimizing error probability P C demands to maximize d 1 C: Proposition 54: Let C 1 and C 2 be two [n, k] q -linear codes For p sufficiently small, if d 1 C 1 > d 1 C 2 then P C 1 < P C 2 Proof: To prove the proposition we assume d 1 C 1 > d 1 C 2 and show that P C 1 p P C 2 = But P C 1 p P C 2 = p = p i=d 1C 1 Q,iC 1 p i 1 p n i j=d 1C 2 Q,jC 2 p j 1 p n j i=d 1C 1 Q,iC 1 p 1 p j=d 1C 2 Q,jC 2 p 1 p i j, where the first equality follows from equation 8 Denoting x = p 1 p and noting that p p 1 p = we get that P C 1 x P C 2 = i=d Q 1C 1,iC 1 x i x j=d Q 1C 2,jC 2 x j d1c 2 i=d = Q 1C 1 d 1C 2,i+d 1C 2C 1 x i x d1c 2 j= Q,j+d1C 2C 2 x j and since we are assuming d 1 C 1 d 1 C 2 >, we have that P C 1 x P C 2 = < 1 and from continuity of the functions we have that P C1 P < 1, C 2 or equivalently P C 1 < P C 2, for every p sufficiently small If for a given pair n, k there exist an MDS AMDS [n, k] q code, we say that n, k is q-mds q-amds As an immediate consequence of Proposition 54 we have the following proposition already known and proven [13]: Proposition 55: If n, k is q-mds and C is an [n, k] q -code that minimizes the error probability, then C is MDS Pairs that are q-mds are not very frequent For q = 2, for example, it is well known that MDS-codes are rather trivial and the unique 2-MDS pairs are the pairs n, n, n, 1, n,, n, n 1 Considering AMDS codes, those are not classified, but there are many constructions of particular families of AMDS codes and results ensuring the existences of such codes with parameters n and k see for example [14] In all those cases, when the pair n, k is AMDS but not MDS, for p sufficiently small, a code that minimizes P should be an AMDS code From Proposition 54 we know that, for p sufficiently small, we should look for codes having maximal minimal distance Among all those codes, which should perform better? A partial answer is given by the next two results and can be summarized as follows: maximize the minimal distance and then minimize the corresponding value in the spectra Proposition 56: Let C 1 and C 2 be two [n, k] q -linear codes with d 1 C 1 = d 1 C 2 If Q,d1C 1 < Q,d1C 2, then P C 1 < P C 2, for p sufficiently small Proof: From equation 8 we get that i=d Q 1C 1,iC 1 x i i=d Q 1C 2,iC 2 x i P C 1 x P C 2 = x We write d 1 = d 1 C 1 = d 1 C 2 and cancel x d from the right side we get P C 1 x P C 2 = Q,d1 C 1 + i=d Q 1+1,iC 1 x i d1 x Q,d1 C 2 + i=d Q 1+1,iC 2 x i d1 = Q,d 1 C 1 Q,d1 C 2 < 1 hence P C 1 < P C 2 for every p sufficiently small Proposition 57: Let C 1 and C 2 be two [n, k] q -linear codes with d 1 C 1 = d 1 C 2 If A 1 d 1 C 1 < A 1 d 1 C 2, then P C 1 < P C 2, for p sufficiently small Proof: It follows straightforward from Proposition 56 and items b and d of Theorem 44

8 VI CONCLUSION In this work we used the generalized weights and spectra to set new bounds for the error probability over an erasure channel Further work may be done exploring the situation when two codes have the same minimal distance and this is attained by the same number of vectors The role of generalized weights and spectra for the error probability still needs to be explained for other channels ACKNOWLEDGMENT This work was partially supported by CAPES and FAPESP grants 27/ and 213/9493- REFERENCES [1] V K Wei, Generalized hamming weights for linear codes, Information Theory, IEEE Transactions on, vol 37, no 5, pp , 1991 [2] H Stichtenoth and C Voss, Generalized hamming weights of trace codes, Information Theory, IEEE Transactions on, vol 4, no 2, pp , 1994 [3] G Feng, K Tzeng, and V Wei, On the generalized hamming weights of several classes of cyclic codes, Information Theory, IEEE Transactions on, vol 38, no 3, pp , 1992 [4] C Munuera, On the generalized hamming weights of geometric goppa codes, Information Theory, IEEE Transactions on, vol 4, no 6, pp , 1994 [5] A Barbero and C Munuera, The weight hierarchy of hermitian codes, SIAM Journal on Discrete Mathematics, vol 13, no 1, pp 79 14, 2 [Online] Available: [6] H Georg Schaathun, The weight hierarchy of product codes, Information Theory, IEEE Transactions on, vol 46, no 7, pp , 2 [7] P Heijnen and R Pellikaan, Generalized hamming weights of q-ary reed-muller codes, Information Theory, IEEE Transactions on, vol 44, no 1, pp , 1998 [8] T Klove, Weight hierarchies of binary linear codes of dimension 4, in Information Theory, 1993 Proceedings 1993 IEEE International Symposium on, 1993, pp [9] J Hirschfeld, M Tsfasman, and S Vladut, The weight hierarchy of higher dimensional hermitian codes, Information Theory, IEEE Transactions on, vol 4, no 1, pp , 1994 [1] A Ashikhmin, A Barg, and S Litsyn, New upper bounds on generalized weights, Information Theory, IEEE Transactions on, vol 45, no 4, pp , 1999 [11] S T D S Han, Higher weights and generalized mds codes, J Korean Math Soc, vol 47, no 6, pp , 21 [12] F Didier, A new upper bound on the block error probability after decoding over the erasure channel, Information Theory, IEEE Transactions on, vol 52, no 1, pp , 26 [13] S Fashandi, S Gharan, and A Khandani, Coding over an erasure channel with a large alphabet size, in Information Theory, 28 ISIT 28 IEEE International Symposium on, 28, pp [14] M A de Boer, Almost mds codes, Designs, Codes and Cryptography, vol 9, no 2, pp , 1996 [15] T Kasami and S Lin, On the probability of undetected error for the maximum distance separable codes, Communications, IEEE Transactions on, vol 32, no 9, pp , 1984 [16] S Dodunekov and I Landgev, On near-mds codes, Journal of Geometry, vol 54, no 1-2, pp 3 43, 1995 [Online] Available:

Matrix characterization of linear codes with arbitrary Hamming weight hierarchy

Matrix characterization of linear codes with arbitrary Hamming weight hierarchy Linear Algebra and its Applications 412 (2006) 396 407 www.elsevier.com/locate/laa Matrix characterization of linear codes with arbitrary Hamming weight hierarchy G. Viswanath, B. Sundar Rajan Department

More information

Duality for poset codes

Duality for poset codes Allan O. Moura Marcelo Firer State University of Campinas Fq9 - UCD, July 13-17 2009 Outline 1 Basic definitions 2 3 Outline Basic Definitions 1 Basic definitions 2 3 Notation Basic Definitions [n] = {1,2,...,n}

More information

Arrangements, matroids and codes

Arrangements, matroids and codes Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde

More information

Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth s second tower

Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth s second tower Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth s second tower arxiv:5.0630v [cs.it] 9 Nov 05 Olav Geil, Stefano Martin, Umberto Martínez-Peñas, Diego Ruano Abstract Asymptotically

More information

Support weight enumerators and coset weight distributions of isodual codes

Support weight enumerators and coset weight distributions of isodual codes Support weight enumerators and coset weight distributions of isodual codes Olgica Milenkovic Department of Electrical and Computer Engineering University of Colorado, Boulder March 31, 2003 Abstract In

More information

Algebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding.

Algebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding. Linear December 2, 2011 References Linear Main Source: Stichtenoth, Henning. Function Fields and. Springer, 2009. Other Sources: Høholdt, Lint and Pellikaan. geometry codes. Handbook of Coding Theory,

More information

Error-correcting Pairs for a Public-key Cryptosystem

Error-correcting Pairs for a Public-key Cryptosystem Error-correcting Pairs for a Public-key Cryptosystem Ruud Pellikaan g.r.pellikaan@tue.nl joint work with Irene Márquez-Corbella Code-based Cryptography Workshop 2012 Lyngby, 9 May 2012 Introduction and

More information

LET be the finite field of cardinality and let

LET be the finite field of cardinality and let 128 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 43, NO. 1, JANUARY 1997 An Explicit Construction of a Sequence of Codes Attaining the Tsfasman Vlăduţ Zink Bound The First Steps Conny Voss Tom Høholdt,

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

Orthogonal Arrays & Codes

Orthogonal Arrays & Codes Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible

More information

On Linear Subspace Codes Closed under Intersection

On Linear Subspace Codes Closed under Intersection On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F

More information

Open Questions in Coding Theory

Open Questions in Coding Theory Open Questions in Coding Theory Steven T. Dougherty July 4, 2013 Open Questions The following questions were posed by: S.T. Dougherty J.L. Kim P. Solé J. Wood Hilbert Style Problems Hilbert Style Problems

More information

On Cryptographic Properties of the Cosets of R(1;m)

On Cryptographic Properties of the Cosets of R(1;m) 1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract

More information

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q MATH-315201 This question paper consists of 6 printed pages, each of which is identified by the reference MATH-3152 Only approved basic scientific calculators may be used. c UNIVERSITY OF LEEDS Examination

More information

Applications of Algebraic Geometric Codes to Polar Coding

Applications of Algebraic Geometric Codes to Polar Coding Clemson University TigerPrints All Dissertations Dissertations 5-015 Applications of Algebraic Geometric Codes to Polar Coding Sarah E Anderson Clemson University Follow this and additional works at: https://tigerprintsclemsonedu/all_dissertations

More information

Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q)

Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q) Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q) M. Lavrauw L. Storme G. Van de Voorde October 4, 2007 Abstract In this paper, we study the p-ary linear code C k (n, q),

More information

ON WEIERSTRASS SEMIGROUPS AND THE REDUNDANCY OF IMPROVED GEOMETRIC GOPPA CODES

ON WEIERSTRASS SEMIGROUPS AND THE REDUNDANCY OF IMPROVED GEOMETRIC GOPPA CODES ON WEIERSTRASS SEMIGROUPS AND THE REDUNDANCY OF IMPROVED GEOMETRIC GOPPA CODES RUUD PELLIKAAN AND FERNANDO TORRES Appeared in: IEEE Trans. Inform. Theory, vol. 45, pp. 2512-2519, Nov. 1999 Abstract. Improved

More information

A generalization of the Weierstrass semigroup

A generalization of the Weierstrass semigroup Journal of Pure and Applied Algebra 207 (2006) 243 260 www.elsevier.com/locate/jpaa A generalization of the Weierstrass semigroup Peter Beelen a,, Nesrin Tutaş b a Department of Mathematics, Danish Technical

More information

RUUD PELLIKAAN, HENNING STICHTENOTH, AND FERNANDO TORRES

RUUD PELLIKAAN, HENNING STICHTENOTH, AND FERNANDO TORRES Appeared in: Finite Fields and their Applications, vol. 4, pp. 38-392, 998. WEIERSTRASS SEMIGROUPS IN AN ASYMPTOTICALLY GOOD TOWER OF FUNCTION FIELDS RUUD PELLIKAAN, HENNING STICHTENOTH, AND FERNANDO TORRES

More information

Codes for Partially Stuck-at Memory Cells

Codes for Partially Stuck-at Memory Cells 1 Codes for Partially Stuck-at Memory Cells Antonia Wachter-Zeh and Eitan Yaakobi Department of Computer Science Technion Israel Institute of Technology, Haifa, Israel Email: {antonia, yaakobi@cs.technion.ac.il

More information

IN this paper, we exploit the information given by the generalized

IN this paper, we exploit the information given by the generalized 4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 10, OCTOBER 2006 A New Upper Bound on the Block Error Probability After Decoding Over the Erasure Channel Frédéric Didier Abstract Motivated by

More information

Rank and Kernel of binary Hadamard codes.

Rank and Kernel of binary Hadamard codes. 1 Rank and Kernel of binary Hadamard codes. K.T. Phelps, J. Rifà Senior Member IEEE, M. Villanueva Abstract In this paper the rank and the dimension of the kernel for (binary) Hadamard codes of length

More information

Section 3 Error Correcting Codes (ECC): Fundamentals

Section 3 Error Correcting Codes (ECC): Fundamentals Section 3 Error Correcting Codes (ECC): Fundamentals Communication systems and channel models Definition and examples of ECCs Distance For the contents relevant to distance, Lin & Xing s book, Chapter

More information

Constructions of digital nets using global function fields

Constructions of digital nets using global function fields ACTA ARITHMETICA 105.3 (2002) Constructions of digital nets using global function fields by Harald Niederreiter (Singapore) and Ferruh Özbudak (Ankara) 1. Introduction. The theory of (t, m, s)-nets and

More information

Code Based Cryptology at TU/e

Code Based Cryptology at TU/e Code Based Cryptology at TU/e Ruud Pellikaan g.r.pellikaan@tue.nl University Indonesia, Depok, Nov. 2 University Padjadjaran, Bandung, Nov. 6 Institute Technology Bandung, Bandung, Nov. 6 University Gadjah

More information

Two-point codes on Norm-Trace curves

Two-point codes on Norm-Trace curves Two-point codes on Norm-Trace curves C. Munuera 1, G. C. Tizziotti 2 and F. Torres 2 1 Dept. of Applied Mathematics, University of Valladolid Avda Salamanca SN, 47012 Valladolid, Castilla, Spain 2 IMECC-UNICAMP,

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt

More information

Zigzag Codes: MDS Array Codes with Optimal Rebuilding

Zigzag Codes: MDS Array Codes with Optimal Rebuilding 1 Zigzag Codes: MDS Array Codes with Optimal Rebuilding Itzhak Tamo, Zhiying Wang, and Jehoshua Bruck Electrical Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA Electrical

More information

MATH32031: Coding Theory Part 15: Summary

MATH32031: Coding Theory Part 15: Summary MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,

More information

FUNDAMENTALS OF ERROR-CORRECTING CODES - NOTES. Presenting: Wednesday, June 8. Section 1.6 Problem Set: 35, 40, 41, 43

FUNDAMENTALS OF ERROR-CORRECTING CODES - NOTES. Presenting: Wednesday, June 8. Section 1.6 Problem Set: 35, 40, 41, 43 FUNDAMENTALS OF ERROR-CORRECTING CODES - NOTES BRIAN BOCKELMAN Monday, June 6 2005 Presenter: J. Walker. Material: 1.1-1.4 For Lecture: 1,4,5,8 Problem Set: 6, 10, 14, 17, 19. 1. Basic concepts of linear

More information

Coding problems for memory and storage applications

Coding problems for memory and storage applications .. Coding problems for memory and storage applications Alexander Barg University of Maryland January 27, 2015 A. Barg (UMD) Coding for memory and storage January 27, 2015 1 / 73 Codes with locality Introduction:

More information

Lecture 2 Linear Codes

Lecture 2 Linear Codes Lecture 2 Linear Codes 2.1. Linear Codes From now on we want to identify the alphabet Σ with a finite field F q. For general codes, introduced in the last section, the description is hard. For a code of

More information

A Characterization Of Quantum Codes And Constructions

A Characterization Of Quantum Codes And Constructions A Characterization Of Quantum Codes And Constructions Chaoping Xing Department of Mathematics, National University of Singapore Singapore 117543, Republic of Singapore (email: matxcp@nus.edu.sg) Abstract

More information

Higher weight distribution of Linearized Reed-Solomon codes

Higher weight distribution of Linearized Reed-Solomon codes Higher weight distribution of Linearized Reed-Solomon codes Haode Yan, Yan Liu, Chunlei Liu arxiv:1505.0778v1 [cs.it] 7 May 015 Abstract Let m, d and be ositive integers such that m e, where e = (m,d).

More information

ADDITION BEHAVIOR OF A NUMERICAL SEMIGROUP. Maria Bras-Amorós

ADDITION BEHAVIOR OF A NUMERICAL SEMIGROUP. Maria Bras-Amorós Séminaires & Congrès 11, 2005, p. 21 28 ADDITION BEHAVIOR OF A NUMERICAL SEMIGROUP by Maria Bras-Amorós Abstract. In this work we study some objects describing the addition behavior of a numerical semigroup

More information

A NICE PROOF OF FARKAS LEMMA

A NICE PROOF OF FARKAS LEMMA A NICE PROOF OF FARKAS LEMMA DANIEL VICTOR TAUSK Abstract. The goal of this short note is to present a nice proof of Farkas Lemma which states that if C is the convex cone spanned by a finite set and if

More information

Lecture 3: Error Correcting Codes

Lecture 3: Error Correcting Codes CS 880: Pseudorandomness and Derandomization 1/30/2013 Lecture 3: Error Correcting Codes Instructors: Holger Dell and Dieter van Melkebeek Scribe: Xi Wu In this lecture we review some background on error

More information

Generalized hashing and applications to digital fingerprinting

Generalized hashing and applications to digital fingerprinting Generalized hashing and applications to digital fingerprinting Noga Alon, Gérard Cohen, Michael Krivelevich and Simon Litsyn Abstract Let C be a code of length n over an alphabet of q letters. An n-word

More information

Simplicial complexes, Demi-matroids, Flag of linear codes and pair of matroids

Simplicial complexes, Demi-matroids, Flag of linear codes and pair of matroids Faculty of Science and Technology Department of Mathematics and Statistics Simplicial complexes, Demi-matroids, Flag of linear codes and pair of matroids Ali Zubair MAT-3900 Master s thesis in Mathematics

More information

ON THE ZERO-DIVISOR-CUP-LENGTH OF SPACES OF ORIENTED ISOMETRY CLASSES OF PLANAR POLYGONS. 1. Introduction

ON THE ZERO-DIVISOR-CUP-LENGTH OF SPACES OF ORIENTED ISOMETRY CLASSES OF PLANAR POLYGONS. 1. Introduction ON THE ZERO-DIVISOR-CUP-LENGTH OF SPACES OF ORIENTED ISOMETRY CLASSES OF PLANAR POLYGONS DONALD M. DAVIS Abstract. Using information about the rational cohomology ring of the space M(l 1,..., l n ) of

More information

Welsh s problem on the number of bases of matroids

Welsh s problem on the number of bases of matroids Welsh s problem on the number of bases of matroids Edward S. T. Fan 1 and Tony W. H. Wong 2 1 Department of Mathematics, California Institute of Technology 2 Department of Mathematics, Kutztown University

More information

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps 2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical

More information

Asymptotically good sequences of codes and curves

Asymptotically good sequences of codes and curves Asymptotically good sequences of codes and curves Ruud Pellikaan Technical University of Eindhoven Soria Summer School on Computational Mathematics July 9, 2008 /k 1/29 Content: 8 Some algebraic geometry

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Fall 2011 Instructor : Stefaan Delcroix Contents 1 Introduction to Error-Correcting Codes 3 2 Basic Concepts and Properties 6 2.1 Definitions....................................

More information

MAS309 Coding theory

MAS309 Coding theory MAS309 Coding theory Matthew Fayers January March 2008 This is a set of notes which is supposed to augment your own notes for the Coding Theory course They were written by Matthew Fayers, and very lightly

More information

De Bruijn Cycles for Covering Codes

De Bruijn Cycles for Covering Codes De Bruijn Cycles for Covering Codes Fan Chung, 1 Joshua N. Cooper 1,2 1 Department of Mathematics, University of California, San Diego, La Jolla, California 92093 2 Courant Institute of Mathematical Sciences,

More information

Homological Methods in Commutative Algebra

Homological Methods in Commutative Algebra Homological Methods in Commutative Algebra Olivier Haution Ludwig-Maximilians-Universität München Sommersemester 2017 1 Contents Chapter 1. Associated primes 3 1. Support of a module 3 2. Associated primes

More information

Linear Codes, Target Function Classes, and Network Computing Capacity

Linear Codes, Target Function Classes, and Network Computing Capacity Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:

More information

Groups of Prime Power Order with Derived Subgroup of Prime Order

Groups of Prime Power Order with Derived Subgroup of Prime Order Journal of Algebra 219, 625 657 (1999) Article ID jabr.1998.7909, available online at http://www.idealibrary.com on Groups of Prime Power Order with Derived Subgroup of Prime Order Simon R. Blackburn*

More information

2012 IEEE International Symposium on Information Theory Proceedings

2012 IEEE International Symposium on Information Theory Proceedings Decoding of Cyclic Codes over Symbol-Pair Read Channels Eitan Yaakobi, Jehoshua Bruck, and Paul H Siegel Electrical Engineering Department, California Institute of Technology, Pasadena, CA 9115, USA Electrical

More information

Constructing Critical Indecomposable Codes

Constructing Critical Indecomposable Codes Constructing Critical Indecomposable Codes Judy L. Walker 1 Abstract Critical indecomposable codes were introduced by Assmus [1], who also gave a recursive construction for these objects. One of the key

More information

MATH3302. Coding and Cryptography. Coding Theory

MATH3302. Coding and Cryptography. Coding Theory MATH3302 Coding and Cryptography Coding Theory 2010 Contents 1 Introduction to coding theory 2 1.1 Introduction.......................................... 2 1.2 Basic definitions and assumptions..............................

More information

ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES

ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES ANDRIES E. BROUWER, ARJEH M. COHEN, MAN V.M. NGUYEN Abstract. All mixed (or asymmetric) orthogonal arrays of strength 3 with run size at most 64 are

More information

11 Minimal Distance and the Parity Check Matrix

11 Minimal Distance and the Parity Check Matrix MATH32031: Coding Theory Part 12: Hamming Codes 11 Minimal Distance and the Parity Check Matrix Theorem 23 (Distance Theorem for Linear Codes) Let C be an [n, k] F q -code with parity check matrix H. Then

More information

On the Infinitude of Twin-Primes Bao Qi Feng

On the Infinitude of Twin-Primes Bao Qi Feng On the Infinitude of Twin-Primes Bao Qi Feng Department of Mathematical Sciences, Kent State University at Tuscarawas 330 University Dr. NE, New Philadelphia, OH 44663, USA. Abstract In this article, we

More information

RIEMANN SURFACES. max(0, deg x f)x.

RIEMANN SURFACES. max(0, deg x f)x. RIEMANN SURFACES 10. Weeks 11 12: Riemann-Roch theorem and applications 10.1. Divisors. The notion of a divisor looks very simple. Let X be a compact Riemann surface. A divisor is an expression a x x x

More information

CAYLEY-BACHARACH AND EVALUATION CODES ON COMPLETE INTERSECTIONS

CAYLEY-BACHARACH AND EVALUATION CODES ON COMPLETE INTERSECTIONS CAYLEY-BACHARACH AND EVALUATION CODES ON COMPLETE INTERSECTIONS LEAH GOLD, JOHN LITTLE, AND HAL SCHENCK Abstract. In [9], J. Hansen uses cohomological methods to find a lower bound for the minimum distance

More information

MTH6108 Coding theory

MTH6108 Coding theory MTH6108 Coding theory Contents 1 Introduction and definitions 2 2 Good codes 6 2.1 The main coding theory problem............................ 6 2.2 The Singleton bound...................................

More information

A Lifting Decoding Scheme and its Application to Interleaved Linear Codes

A Lifting Decoding Scheme and its Application to Interleaved Linear Codes Author manuscript, published in "International Symposium on Information Theory (2012) 96-100" DOI : 10.1109/ISIT.2012.6284707 A Lifting Decoding Scheme and its Application to Interleaved Linear Codes Guillaume

More information

Minimum-Distance Based Construction of Multi-Kernel Polar Codes

Minimum-Distance Based Construction of Multi-Kernel Polar Codes Minimum-Distance Based Construction of Multi-Kernel Polar Codes Valerio Bioglio, Frédéric Gabry, Ingmar Land, Jean-Claude Belfiore Mathematical and Algorithmic Sciences Lab France Research Center, Huawei

More information

On Locating-Dominating Codes in Binary Hamming Spaces

On Locating-Dominating Codes in Binary Hamming Spaces Discrete Mathematics and Theoretical Computer Science 6, 2004, 265 282 On Locating-Dominating Codes in Binary Hamming Spaces Iiro Honkala and Tero Laihonen and Sanna Ranto Department of Mathematics and

More information

Cover Page. The handle holds various files of this Leiden University dissertation

Cover Page. The handle   holds various files of this Leiden University dissertation Cover Page The handle http://hdl.handle.net/1887/57796 holds various files of this Leiden University dissertation Author: Mirandola, Diego Title: On products of linear error correcting codes Date: 2017-12-06

More information

Error Correcting Codes Questions Pool

Error Correcting Codes Questions Pool Error Correcting Codes Questions Pool Amnon Ta-Shma and Dean Doron January 3, 018 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to

More information

On the floor and the ceiling of a divisor

On the floor and the ceiling of a divisor Finite Fields and Their Applications 12 (2006) 38 55 http://www.elsevier.com/locate/ffa On the floor and the ceiling of a divisor Hiren Maharaj, Gretchen L. Matthews 1 Department of Mathematical Sciences,

More information

Sphere Packing and Shannon s Theorem

Sphere Packing and Shannon s Theorem Chapter 2 Sphere Packing and Shannon s Theorem In the first section we discuss the basics of block coding on the m-ary symmetric channel. In the second section we see how the geometry of the codespace

More information

Arbitrary Alphabet Size

Arbitrary Alphabet Size Optimal Coding for the Erasure Channel with Arbitrary Alphabet Size Shervan Fashandi, Shahab Oveis Gharan and Amir K. Khandani ECE Dept., University of Waterloo, Waterloo, O, Canada, 2L3G email: {sfashand,shahab,khandani}@cst.uwaterloo.ca

More information

On the Polarization Levels of Automorphic-Symmetric Channels

On the Polarization Levels of Automorphic-Symmetric Channels On the Polarization Levels of Automorphic-Symmetric Channels Rajai Nasser Email: rajai.nasser@alumni.epfl.ch arxiv:8.05203v2 [cs.it] 5 Nov 208 Abstract It is known that if an Abelian group operation is

More information

Chapter 3 Linear Block Codes

Chapter 3 Linear Block Codes Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and

More information

Feedback Capacity of a Class of Symmetric Finite-State Markov Channels

Feedback Capacity of a Class of Symmetric Finite-State Markov Channels Feedback Capacity of a Class of Symmetric Finite-State Markov Channels Nevroz Şen, Fady Alajaji and Serdar Yüksel Department of Mathematics and Statistics Queen s University Kingston, ON K7L 3N6, Canada

More information

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane 2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and

More information

LIMITING CASES OF BOARDMAN S FIVE HALVES THEOREM

LIMITING CASES OF BOARDMAN S FIVE HALVES THEOREM Proceedings of the Edinburgh Mathematical Society Submitted Paper Paper 14 June 2011 LIMITING CASES OF BOARDMAN S FIVE HALVES THEOREM MICHAEL C. CRABB AND PEDRO L. Q. PERGHER Institute of Mathematics,

More information

FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES

FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES ANDRIES E. BROUWER, ARJEH M. COHEN, MAN V.M. NGUYEN Abstract. All mixed (or asymmetric) orthogonal arrays of strength 3 with run size at most

More information

Reed-Solomon codes. Chapter Linear codes over finite fields

Reed-Solomon codes. Chapter Linear codes over finite fields Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime

More information

MAXIMUM NUMBER OF COMMON ZEROS OF HOMOGENEOUS POLYNOMIALS OVER FINITE FIELDS PETER BEELEN, MRINMOY DATTA, AND SUDHIR R. GHORPADE

MAXIMUM NUMBER OF COMMON ZEROS OF HOMOGENEOUS POLYNOMIALS OVER FINITE FIELDS PETER BEELEN, MRINMOY DATTA, AND SUDHIR R. GHORPADE Peter Beelen, Mrinmoy Datta, Sudhir R Ghorpade Maximum number of common zeros of homogeneous polynomials over finite fields Proceedings of the American Mathematical Society DOI: 10.1090/proc/13863 Accepted

More information

Asymptotically good sequences of curves and codes

Asymptotically good sequences of curves and codes Asymptotically good sequences of curves and codes Ruud Pellikaan Appeared in in Proc 34th Allerton Conf on Communication, Control, and Computing, Urbana-Champaign, October 2-4, 1996, 276-285 1 Introduction

More information

Honors Algebra 4, MATH 371 Winter 2010 Assignment 4 Due Wednesday, February 17 at 08:35

Honors Algebra 4, MATH 371 Winter 2010 Assignment 4 Due Wednesday, February 17 at 08:35 Honors Algebra 4, MATH 371 Winter 2010 Assignment 4 Due Wednesday, February 17 at 08:35 1. Let R be a commutative ring with 1 0. (a) Prove that the nilradical of R is equal to the intersection of the prime

More information

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005 Chapter 7 Error Control Coding Mikael Olofsson 2005 We have seen in Chapters 4 through 6 how digital modulation can be used to control error probabilities. This gives us a digital channel that in each

More information

Combinatória e Teoria de Códigos Exercises from the notes. Chapter 1

Combinatória e Teoria de Códigos Exercises from the notes. Chapter 1 Combinatória e Teoria de Códigos Exercises from the notes Chapter 1 1.1. The following binary word 01111000000?001110000?00110011001010111000000000?01110 encodes a date. The encoding method used consisted

More information

A Tight Rate Bound and Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures

A Tight Rate Bound and Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures 1 A Tight Rate Bound and Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures arxiv:181050v1 [csit] 6 Dec 018 S B Balaji, Ganesh R Kini and

More information

arxiv: v2 [math.gr] 22 Aug 2016

arxiv: v2 [math.gr] 22 Aug 2016 THEORY OF DISGUISED-GROUPS EDUARDO BLANCO GÓMEZ arxiv:1607.07345v2 [math.gr] 22 Aug 2016 Abstract. In this paper we define a new algebraic object: the disguised-groups. We show the main properties of the

More information

Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes

Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes Alain Couvreur, Irene Márquez-Corbella and Ruud Pellikaan Abstract We give a polynomial time attack on the McEliece

More information

An upper bound on l q norms of noisy functions

An upper bound on l q norms of noisy functions Electronic Collouium on Computational Complexity, Report No. 68 08 An upper bound on l norms of noisy functions Alex Samorodnitsky Abstract Let T ɛ, 0 ɛ /, be the noise operator acting on functions on

More information

Estimates of the Distance Distribution of Codes and Designs

Estimates of the Distance Distribution of Codes and Designs 1050 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 Estimates of the Distance Distribution of Codes Designs Alexei Ashikhmin, Member, IEEE, Alexer Barg, Senior Member, IEEE, Simon

More information

Multi-Kernel Polar Codes: Proof of Polarization and Error Exponents

Multi-Kernel Polar Codes: Proof of Polarization and Error Exponents Multi-Kernel Polar Codes: Proof of Polarization and Error Exponents Meryem Benammar, Valerio Bioglio, Frédéric Gabry, Ingmar Land Mathematical and Algorithmic Sciences Lab Paris Research Center, Huawei

More information

Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel

Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel Ohad Barak, David Burshtein and Meir Feder School of Electrical Engineering Tel-Aviv University Tel-Aviv 69978, Israel Abstract

More information

ON PERTURBATION OF BINARY LINEAR CODES. PANKAJ K. DAS and LALIT K. VASHISHT

ON PERTURBATION OF BINARY LINEAR CODES. PANKAJ K. DAS and LALIT K. VASHISHT Math Appl 4 (2015), 91 99 DOI: 1013164/ma201507 ON PERTURBATION OF BINARY LINEAR CODES PANKAJ K DAS and LALIT K VASHISHT Abstract We present new codes by perturbation of rows of the generating matrix of

More information

Error control of line codes generated by finite Coxeter groups

Error control of line codes generated by finite Coxeter groups Error control of line codes generated by finite Coxeter groups Ezio Biglieri Universitat Pompeu Fabra, Barcelona, Spain Email: e.biglieri@ieee.org Emanuele Viterbo Monash University, Melbourne, Australia

More information

Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra

Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra D. R. Wilkins Contents 3 Topics in Commutative Algebra 2 3.1 Rings and Fields......................... 2 3.2 Ideals...............................

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

LIFTED CODES OVER FINITE CHAIN RINGS

LIFTED CODES OVER FINITE CHAIN RINGS Math. J. Okayama Univ. 53 (2011), 39 53 LIFTED CODES OVER FINITE CHAIN RINGS Steven T. Dougherty, Hongwei Liu and Young Ho Park Abstract. In this paper, we study lifted codes over finite chain rings. We

More information

A proof of the Jordan normal form theorem

A proof of the Jordan normal form theorem A proof of the Jordan normal form theorem Jordan normal form theorem states that any matrix is similar to a blockdiagonal matrix with Jordan blocks on the diagonal. To prove it, we first reformulate it

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

Numerical Sequences and Series

Numerical Sequences and Series Numerical Sequences and Series Written by Men-Gen Tsai email: b89902089@ntu.edu.tw. Prove that the convergence of {s n } implies convergence of { s n }. Is the converse true? Solution: Since {s n } is

More information

LINEAR ALGEBRA: THEORY. Version: August 12,

LINEAR ALGEBRA: THEORY. Version: August 12, LINEAR ALGEBRA: THEORY. Version: August 12, 2000 13 2 Basic concepts We will assume that the following concepts are known: Vector, column vector, row vector, transpose. Recall that x is a column vector,

More information

On the properness of some optimal binary linear codes and their dual codes

On the properness of some optimal binary linear codes and their dual codes Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 76-81 On the properness of some optimal binary linear codes and their dual codes Rossitza

More information

The minimum distance of codes in an array coming from telescopic semigroups

The minimum distance of codes in an array coming from telescopic semigroups The minimum distance of codes in an array coming from telescopic semigroups Christoph Kirfel and Ruud Pellikaan in IEEE Transactions Information Theory, vol. 41, pp. 1720 1732, (1995) Abstract The concept

More information

Security in Locally Repairable Storage

Security in Locally Repairable Storage 1 Security in Locally Repairable Storage Abhishek Agarwal and Arya Mazumdar Abstract In this paper we extend the notion of locally repairable codes to secret sharing schemes. The main problem we consider

More information

Notes for Math 290 using Introduction to Mathematical Proofs by Charles E. Roberts, Jr.

Notes for Math 290 using Introduction to Mathematical Proofs by Charles E. Roberts, Jr. Notes for Math 290 using Introduction to Mathematical Proofs by Charles E. Roberts, Jr. Chapter : Logic Topics:. Statements, Negation, and Compound Statements.2 Truth Tables and Logical Equivalences.3

More information

Where is matrix multiplication locally open?

Where is matrix multiplication locally open? Linear Algebra and its Applications 517 (2017) 167 176 Contents lists available at ScienceDirect Linear Algebra and its Applications www.elsevier.com/locate/laa Where is matrix multiplication locally open?

More information

CYCLIC SIEVING FOR CYCLIC CODES

CYCLIC SIEVING FOR CYCLIC CODES CYCLIC SIEVING FOR CYCLIC CODES ALEX MASON, VICTOR REINER, SHRUTHI SRIDHAR Abstract. These are notes on a preliminary follow-up to a question of Jim Propp, about cyclic sieving of cyclic codes. We show

More information