A shortening of C on the coordinate i is the [n 1, k 1, d] linear code obtained by leaving only such codewords and deleting the ith coordinate.
|
|
- Betty Higgins
- 5 years ago
- Views:
Transcription
1 ENEE 739C: Advanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 6a (draft; 9/21/03. Linear codes. Weights, supports, ranks. abarg/enee739c/course.html The goal of this lecture is to study general properties of linear codes. Let C be a q-ary [n, k] code ith eight distribution {A i, i 0, 1,..., n}. Let G, H be a generator and a parity-check matrix of C. The dual code C is the set C {x H n q : Hx T 0}. Let i be a not all-zero coordinate. We have {c C : c i 0} 1 q C A shortening of C on the coordinate i is the [n 1, k 1, d] linear code obtained by leaving only such codeords and deleting the ith coordinate. Let [n] : {1,..., n}, E [n], Ē [n]\e. For a matrix M ith n columns e denote by M(E the submatrix formed by all the columns ith numbers in E. The support of a vector x Hq n is defined as supp(x {i : x i 0}. Given a subcode A C, its support is supp(a {i [n] : a A a i 0} A shortening of C on the coordinates in Ē is a linear code CE such that x C E supp(x E. A projection of C on the coordinates in Ē, also called puncturing, is a restriction of C to the coordinates in E (simply said, deleting the coorinates in Ē from every codevector of C and deleting repeated entries from the result. The basic facts about shortenings and puncturings are given in the folloing Theorem 1. (i If t d(c 1, then C E is an [n t, k, d(c t] code. (ii dim C E E rk(h(e, dim(c E rk(g(e, dim(c E + dim((c E E. (iii C E C/CĒ. (iv (C E (C E ; (C E (C E. Proof : (i, (iii are obvious. (ii is counting the number of solutions of a system of linear equations. Let us prove the first part of (iv. Let a (C E, then G(Ea T 0, so a (C E. Further, by (ii The second part of (iv is analogous. dim(c E E rk(g(e E dim C E dim(c E. Recall the notation for the Gaussian binomial coefficient: [ ] k 1 n q n i 1 k q k i 1 In other ords, [ ] n [n] k [k][n k] u 1 here [u] (q u 1. Lemma 2. The number of linear [n, k] codes is [ n k]. Proof : [ ] n k equals the number of choices of k linearly independent vectors in H n q divided by the number of different bases of an [n, k] code. Lemma 3. Let E. Then (1 E rk(h(e k rk(g(ē 1
2 2 Proof : Let C E proj E C be the projection of C on the coordinates in E. Clearly, dim C E rk(g(e. On the other hand, C E C/CĒ by Theorem 1(iii; hence by (ii dim C E k dim CĒ k E + rk(h(ē. This lemma bridges linear codes ith the branch of combinatorics knon as matroid theory. It turns out that it is possible to abstract from the linear-algebraic setting and define dependencies axiomatically. One starts ith a finite set [n] and calls some of its subsets independent, making sure they satisfy the same set of natural conditions that the subsets of linearly independent vectors ould. Then for any subset E n one defines its rank as the size of a maximum independent subset contained in it. A large number of properties of independent sets and other subsets can be proved in this purely axiomatic setting, see [18]. Matroid theory finds uses in coding theory [4, 6], cryptography [5], information theory [10], multiuser communication [17] graph theory, topology [11]. Even though e ill not use this here, e ish to point out that this lemma contains the MacWilliams identities in disguise. Recall that ENEE722 gives a different proof of these identities, via the Fourier transform. Both proofs are due to F. J. MacWilliams [15]. Let n, i be nonnegative integers. Recall that n(n 1...(n i+1 i! i n 1 i 0 i 0 otherise In partilucar, ( 0 i δ0,i. Lemma 4. (The MacWilliams identities n u i u i (2 A i C q u A i. u n u Proof : We have the folloing chain of equalities: n u i (3 A i u E n u E n u (C E q n k u q n u rk(g(e E n u q u rk(h(ē u i q n k u A i. n u Here the first equality follos by counting in to ays the size of the set {(E, c : E n u and c (C E, t(c n u}, the second one is straightforard, the third one (the central step in the proof is implied by Lemma 3, and the final step follos by the same argument as the first one. A familiar form of these identities is obtained by using the eight enumerators of the code C and its dual code C. We have A(x, y 1 C A(x + (y, x y. The MacWilliams identities exist in a variety of different forms, see [13]. Remark. You should be aare that the linear-algebraic approach to the MacWilliams identities is only one of a number of possible points of vie. First of all, a substantial portion of the results above can be extended to nonlinear codes [16, Ch.5,6]. A combinatorial perspective is given in P. Delsarte [8], see also
3 3 [16, Ch. 21], [9]. An approach via harmonic analysis is given in G. Kabatiansky and V. Levenshtein [14], see also [7, Ch.9]. Binomial moments of the eight distribution. The quantities i C A i ( 0, 1,..., n n are called binomial moments of the eight distribution of the code C. We have seen (3 that C q dim(ce. E Clearly for an [n, k, d] code, C 0 1, C ( n, 1,..., d 1. It is possible to express the eight coefficients via the binomial moments. Lemma 5. Proof : A i i ( 1 i C. n i i ( 1 i C n i i j ( 1 i A j n i n i A j j0 i j0 A i j0 j ( ( n n j ( 1 i n i n A j ( n j n i j ( i j ( 1 i i Lemma 6. Let A(x, y be the eight enumerator of C and let C(x, y n C x n y. Proof : From (2 n C (x y n y A(x, y C(x y, y n n C y ( 1 n j x j y n j j j0 n n j x j y n j ( 1 n j C j j0 { } i n j n x n i y i A i. C n u q n k u C u n x j y n j j0 i ( 1 i n i (u 0,..., n. Introducing the eight enumerators C(x, y C i x n i y i, C (x, y C i xn i y i e then have C n u x n u y u q k C u (xq n u y u C C (y, x q k C(qx, y, a remarkably simple form of the MacWilliams equation.
4 4 An interesting observation about the binomial moments is that hile it is not possible to bound belo individual coefficients of the eight distribution, it is possible to do this for linear combinations of these coefficients (binomial moments. Here is one possibility: Theorem 7. Proof : Let E [n]. We have C dim(c E E rk(h(e q max(0, n+k q min(,n k q max(0, n+k This result can be applied to bounding the probability of undetected error P u of a linear [n, k] code. We have Theorem 8. [1] Let C be an [n, k] linear q-ary code. n ( p ( P u (q n+k 1 1 q n p. n k+1 Proof : From the previous theorem, Then C max(0, q n+k 1. p ( P u (C A(1 p, (1 pn C 1 p q, p n ( p ( C 1 q n p n ( p n ( p ( (C 1 q n p n ( p ( max(0, q n+k 1 1 q n p (1 p n ( 1 q p n In many cases the results of the last to theorems can be improved and generalized (to nonlinear codes, see [3]. The next exercise is the first step along this ay. Exercise. (Forget the 0 Try to define binomial moments of the distance distribution C for an unrestricted (i.e., not necessarily linear binary code C. Begin ith the folloing question: hat is the support of a subcode? (Hint: start ith subcodes of size 2. Prove that Lemma 6 still holds true, ith A(x, y replaced by the distance enumerator B(x, y. The rank function. Rerite (3 by collecting on the right-hand side subsets of one and the same rank. Namely, let U v u {E {1, 2,..., n} E u, rk(g(e v}. For instance, U k k (4 is the number of information sets of the code C. By (3 and Theorem 1(ii e have k n i A i q v (U v n, here the numbers U are the rank coefficients of C. Further, Lemma 3 implies that (5 (U u k+v u v0 U v n u. The last to equations relate the eight enumerator of C and its rank distribution (U v u, 0 u n, 0 v k.
5 5 Example. (MDS codes An (n, M, d code is called maximum distance separable (MDS if M q n d+1. Let C be an [n, k, n k+1] q-ary linear MDS code ith a parity-check matrix H. Then rk(h(e min{ E, n k} for all E S, 0 E n k. Therefore {( n (U v u u if (0 v u n k or (u n k + 1, v n k; 0 otherise. This enables us to compute the eight spectrum of C. Substituting the values of (U v u into (4, e obtain A 0 1, A i 0 for 1 i n k, and l 1 k + l A n k+l ( 1 j (q l j 1 (1 l k. k l j j0 Definition 1. The rank polynomial of a linear code C is U(x, y n u0 v0 k Uux v u y v. Relations of the rank polynomial of C, its dual code C, and the eight polynomial of C are given by the folloing results. Theorem 9. Proof : We have (6 (7 U (x, y ( 1 U (x, y x n y dim C U xy, y. n n k (U v ux u y v u0 v0 u0 v0 n n k Un u k u+v x u y v (by (5 u0 v0 n n k x n Uu k n+u+v x u y v n n k x n y n k Uu u v (xy u y u v x n y n k n u0 v0 u u0 vu n+k U v u(xy u y v. No let E n u, rk(g(ē v. Then Ē u and by (1 0 rk(h(e E k + v v (u n + k. Hence, for 0 v u n + k 1 e have U v u 0. Thus, the summation interval of v in (7 can be extended to 0 v u. Theorem 10. ( x y A(x, y y n C U, 1 y q (x y n U ( qy x y, 1. q Information profile of a linear code. Let C be a linear code, [n] {1,..., n}, E [n]. Consider the average (over the choice of E dimension of the code C E : ( 1 n e dim(c E. E ( [n] The number e can be thought of an the average information content of a -subset.
6 6 The numbers (e, 1,..., n constitute the information profile of the code C. Since dim(c E rk(g(e, here G is the generator matrix of C, e can also rite e iu i (C. The information profile as introduced for its one sake in [12] and as used recently in analyzing iterative decoding. Paper [12] also computes the average value of e over all [n, k] codes. Minimal vectors in linear codes. For the vectors x, y Hq n e rite x y (x y if supp(x supp(y (resp., supp(x supp(y. Definition 2. Let C Hq n be a linear code. A nonzero vector c C is called minimal if 0 c c implies c ac here c is another codevector and a is a constant. In ords: nonminimal vector covers a nonzero vector ith a smaller support. Let H be a parity-check matrix of C and let M be the set of its minimal vectors. Let us list basic properties of minimal vectors. Lemma 11. (i Let c C, U supp(c. Then c M if and only if rk(h(u U 1. (ii (U is minimal ( U n k + 1. (iii Every support of size U d(1 + 1 q 1 1 is minimal. (iv The linear span (the set of all linear combinations of M(C coincides ith C. Moreover, if q 2 then every nonzero codevector can be decomposed into a sum of minimal vectors ith pairise disjoint supports. (v Let C be a binary code. Then if c C, c M(C, then there is a pair of nonzero code vectors c 1 c and c 2 c ith disjoint supports such that c c 1 + c 2. Proof : The only if part of (1 is obvious. Let us prove the converse. Let h i be the ith column of H(U. By assumption, there exist U nonzero numbers λ i such that λ i h i 0 i1 and some 1 of these columns, say the first, are linearly independent. Suppose there exists a code vector c, c c, i.e., there exists a vanishing linear combination of columns that does not involve at least one of the first 1 columns, for instance, µ i h i 0 i2 ith µ 0. Multiply this sum by λ /µ and subtract from the first one. This gives a linear dependence beteen the first 1 columns, a contradiction. Part (ii is implied by (i. To prove part (iii, suppose that c C is a nonminimal vector of eight t(c d ( 1 + q and let c c, c C\{0}. Consider code vectors c ac, here a runs over all nonzero constants. Summing up their eights, e get ( t(c t(c. Thus, their average eight is t(c ( 1 t(c. One of these vectors, say c has eight at most the average. Together ith our assumption this implies a contradiction: t(c t(c t(c d( d 1 d 1. Part (iv Let c C\{0}. Suppose it is not minimal, then there is a minimal vector m 1 such that supp(m 1 supp(c. There alays is a nonzero constant a 1 such that (c a 1 m 1 c. Denote c 1 c a 1 m 1. By the same argument, either c 1 is minimal or there is an m 2 M such that (c 1 a 2 m 2 c 1. Since the
7 7 size of the support falls by (at least one in every step, for a certain i, the vector c i ill be minimal. Then c i c i 1 j1 a jc j. Part (v is obvious. Ho many minimal vectors are there in a typical linear code? Consider the ensemble given by random (n k n parity-check matrices. Let EM be the expected number of minimal vectors of eight. Theorem 12. [2] Let n k + 1. Then ( 2 EM q n k (1 q (n k i. VarM EM (1 + 2 d/2 EM. For the proof consult the source. In particular, this theorem implies that for n almost all vectors of eight n k + 1 in a typical linear code are minimal. The main uses of minimal vectors are in decoding of linear codes and cryptography (access structures in secret sharing schemes. Example: Let C be an [n qm 1 q 1, n m 1, 3] Hamming code. We have M 1 2 (q m q i, (3 m + 1.! Proof: Consider s 1 linearly independent columns in the parity-check matrix H of the code C. The total number of linear combinations of these columns ith nonzero coefficients equals ( s ; the 1/(q 1th fraction of them appear as columns in H distinct from the chosen columns (since they are linearly independent. Every choice of linearly dependent columns of hich s 1 are linearly independent, defines a minimal codeord. Thus, one has to count the number of distinct choices of s linearly independent columns in H. This number equals 1 ( s! n(n 1 n q2 1 (... n qs 1 1 Taking into account that all the ( 1 choices of 1 linearly independent columns ithin a given support of size yield one and the same codeord, e find that the number of minimal codeords of eight in the code equals 1 ( B ( 1! n(n 1 n q2 1 (... n qs 1 1 ( s, The substitution of the value of n gives the desired result. References 1. K. A. S. Abdel-Ghaffar, A loer bound on the undetected error probability and strictly optimal codes, IEEE Trans. Inform. Theory (1997, no. 5, A. Ashikhmin and A. Barg, Minimal vectors in linear codes, IEEE Trans. Inform. Theory 44 (1998, no. 5, , Binomial moments of the distance distribution: Bounds and applications, IEEE Trans. Inform. Theory 45 (1999, no. 2, A. Barg, The matroid of supports of a linear code, Appl. Alg. Engrg. Commun. Comput. 8 (1997, E. F. Brickell and D. M. Davenport, On the classification of ideal secret sharing schemes, J. Cryptology 4 (1991, T Britz, MacWilliams identities and matroid polynomials, Electron. J. Combin. 9 (2002, #R J. H. Conay and N. J. A. Sloane, Sphere packings, lattices and groups, Springer-Verlag, Ne York-Berlin, P. Delsarte, An algebraic approach to the association schemes of coding theory, Philips Research Repts Suppl. 10 (1973, P. Delsarte and V. I. Levenshtein, Association schemes and coding theory, IEEE Trans. Inform. Theory 44 (1998, no. 6, S. Fujishige, Entropy functions and polymatroids combinatorial structures in information theory, Electron. Comm. Japan 61 (1978, no. 4, I. M. Gel fand and R. D. MacPherson, A combinatorial formula for the Pontrjagin classes, Bull. Amer. Math. Soc. (N.S. 26 (1992, no. 2,
8 8 12. T. Helleseth, T. Kløve, and V. I. Levenshtein, On the information function of an error-correcting code, IEEE Trans. Inform. Theory 43 (1997, no. 2, W. C. Huffman and V. Pless, Fundamentals of error-correcting codes, Ne York: Cambridge University Press, G. Kabatyansky and V. I. Levenshtein, Bounds for packings on the sphere and in the space, Problems of Information Transmission 14 (1978, no. 1, F. J. MacWilliams, A theorem in the distribution of eights in a systematic code, Bell Syst. Techn. Journ. 42 (1963, F. J. MacWilliams and N. J. A. Sloane, The theory of error-correcting codes, 3 ed., North-Holland, Amsterdam, D. N. C. Tse and S. V. Hanly, Multiaccess fading channels. I. Polymatroid structure, optimal resource allocation and throughput capacities, IEEE Trans. Inform. Theory 44 (1998, D. J. A. Welsh, Matroid theory, Academic Press, London, 1976.
Average Coset Weight Distributions of Gallager s LDPC Code Ensemble
1 Average Coset Weight Distributions of Gallager s LDPC Code Ensemble Tadashi Wadayama Abstract In this correspondence, the average coset eight distributions of Gallager s LDPC code ensemble are investigated.
More informationSupport weight enumerators and coset weight distributions of isodual codes
Support weight enumerators and coset weight distributions of isodual codes Olgica Milenkovic Department of Electrical and Computer Engineering University of Colorado, Boulder March 31, 2003 Abstract In
More informationArrangements, matroids and codes
Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde
More informationOn non-antipodal binary completely regular codes
On non-antipodal binary completely regular codes J. Borges, J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, 08193-Bellaterra, Spain. V.A. Zinoviev Institute
More informationThe Witt designs, Golay codes and Mathieu groups
The Witt designs, Golay codes and Mathieu groups 1 The Golay codes Let V be a vector space over F q with fixed basis e 1,..., e n. A code C is a subset of V. A linear code is a subspace of V. The vector
More informationLecture 2 Linear Codes
Lecture 2 Linear Codes 2.1. Linear Codes From now on we want to identify the alphabet Σ with a finite field F q. For general codes, introduced in the last section, the description is hard. For a code of
More informationThe Hamming Codes and Delsarte s Linear Programming Bound
The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the
More informationQuantum Error Detection I: Statement of the Problem
778 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 46, NO 3, MAY 2000 Quantum Error Detection I: Statement of the Problem Alexei E Ashikhmin, Alexander M Barg, Emanuel Knill, and Simon N Litsyn, Member,
More informationOn the Griesmer bound for nonlinear codes
On the Griesmer bound for nonlinear codes Emanuele Bellini, Alessio Meneghetti To cite this version: Emanuele Bellini, Alessio Meneghetti. On the Griesmer bound for nonlinear codes. Pascale Charpin, Nicolas
More informationHamming codes and simplex codes ( )
Chapter 6 Hamming codes and simplex codes (2018-03-17) Synopsis. Hamming codes are essentially the first non-trivial family of codes that we shall meet. We start by proving the Distance Theorem for linear
More informationOpen Questions in Coding Theory
Open Questions in Coding Theory Steven T. Dougherty July 4, 2013 Open Questions The following questions were posed by: S.T. Dougherty J.L. Kim P. Solé J. Wood Hilbert Style Problems Hilbert Style Problems
More informationMatroids/1. I and I 2 ,I 2 > I 1
Matroids 1 Definition A matroid is an abstraction of the notion of linear independence in a vector space. See Oxley [6], Welsh [7] for further information about matroids. A matroid is a pair (E,I ), where
More informationON LINEAR ORDERED CODES
ON LINEAR ORDERED CODES ALEXANDER BARG AND WOOMYOUNG PARK ABSTRACT We consider linear codes in the metric space with the Niederreiter-Rosenbloom-Tsfasman NRT metric, calling them linear ordered codes In
More informationOn the properness of some optimal binary linear codes and their dual codes
Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 76-81 On the properness of some optimal binary linear codes and their dual codes Rossitza
More informationA NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1
BULLETIN (New Series) OF THE AMERICAN MATHEMATICAL SOCIETY Volume 23, Number 2, October 1990 A NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1 J. H. CONWAY AND N. J. A. SLOANE ABSTRACT.
More informationPAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES
International Journal of Pure and Applied Mathematics Volume 85 No. 6 013, 1001-1008 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/10.173/ijpam.v85i6.3
More informationCHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum
CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum 1997 19 CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION 3.0. Introduction
More informationPermutation decoding for the binary codes from triangular graphs
Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for
More informationImproved Upper Bounds on Sizes of Codes
880 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 4, APRIL 2002 Improved Upper Bounds on Sizes of Codes Beniamin Mounits, Tuvi Etzion, Senior Member, IEEE, and Simon Litsyn, Senior Member, IEEE
More informationThe cocycle lattice of binary matroids
Published in: Europ. J. Comb. 14 (1993), 241 250. The cocycle lattice of binary matroids László Lovász Eötvös University, Budapest, Hungary, H-1088 Princeton University, Princeton, NJ 08544 Ákos Seress*
More informationSome codes related to BCH-codes of low dimension
Discrete Mathematics 205 (1999) 57 64 www.elsevier.com/locate/disc Some codes related to BCH-codes of low dimension Yves Edel a,jurgen Bierbrauer b; a Mathematisches Institut der Universitat, Im Neuenheimer
More informationA Combinatorial Bound on the List Size
1 A Combinatorial Bound on the List Size Yuval Cassuto and Jehoshua Bruck California Institute of Technology Electrical Engineering Department MC 136-93 Pasadena, CA 9115, U.S.A. E-mail: {ycassuto,bruck}@paradise.caltech.edu
More informationOn the adjacency matrix of a block graph
On the adjacency matrix of a block graph R. B. Bapat Stat-Math Unit Indian Statistical Institute, Delhi 7-SJSS Marg, New Delhi 110 016, India. email: rbb@isid.ac.in Souvik Roy Economics and Planning Unit
More informationThe degree sequence of Fibonacci and Lucas cubes
The degree sequence of Fibonacci and Lucas cubes Sandi Klavžar Faculty of Mathematics and Physics University of Ljubljana, Slovenia and Faculty of Natural Sciences and Mathematics University of Maribor,
More informationAn Analytic Approach to the Problem of Matroid Representibility: Summer REU 2015
An Analytic Approach to the Problem of Matroid Representibility: Summer REU 2015 D. Capodilupo 1, S. Freedman 1, M. Hua 1, and J. Sun 1 1 Department of Mathematics, University of Michigan Abstract A central
More informationCodes from lattice and related graphs, and permutation decoding
Codes from lattice and related graphs, and permutation decoding J. D. Key School of Mathematical Sciences University of KwaZulu-Natal Pietermaritzburg 3209, South Africa B. G. Rodrigues School of Mathematical
More informationarxiv: v4 [cs.it] 14 May 2013
arxiv:1006.1694v4 [cs.it] 14 May 2013 PURE ASYMMETRIC QUANTUM MDS CODES FROM CSS CONSTRUCTION: A COMPLETE CHARACTERIZATION MARTIANUS FREDERIC EZERMAN Centre for Quantum Technologies, National University
More informationMath 249B. Geometric Bruhat decomposition
Math 249B. Geometric Bruhat decomposition 1. Introduction Let (G, T ) be a split connected reductive group over a field k, and Φ = Φ(G, T ). Fix a positive system of roots Φ Φ, and let B be the unique
More informationGeneral error locator polynomials for binary cyclic codes with t 2 and n < 63
General error locator polynomials for binary cyclic codes with t 2 and n < 63 April 22, 2005 Teo Mora (theomora@disi.unige.it) Department of Mathematics, University of Genoa, Italy. Emmanuela Orsini (orsini@posso.dm.unipi.it)
More informationCoding Theory as Pure Mathematics
Coding Theory as Pure Mathematics Steven T. Dougherty July 1, 2013 Origins of Coding Theory How does one communicate electronic information effectively? Namely can one detect and correct errors made in
More informationA Generalization of a result of Catlin: 2-factors in line graphs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(2) (2018), Pages 164 184 A Generalization of a result of Catlin: 2-factors in line graphs Ronald J. Gould Emory University Atlanta, Georgia U.S.A. rg@mathcs.emory.edu
More informationNew Families of Triple Error Correcting Codes with BCH Parameters
New Families of Triple Error Correcting Codes with BCH Parameters arxiv:0803.3553v1 [cs.it] 25 Mar 2008 Carl Bracken School of Mathematical Sciences University College Dublin Ireland May 30, 2018 Abstract
More informationCh. 2 Math Preliminaries for Lossless Compression. Section 2.4 Coding
Ch. 2 Math Preliminaries for Lossless Compression Section 2.4 Coding Some General Considerations Definition: An Instantaneous Code maps each symbol into a codeord Notation: a i φ (a i ) Ex. : a 0 For Ex.
More informationBloom Filters and Locality-Sensitive Hashing
Randomized Algorithms, Summer 2016 Bloom Filters and Locality-Sensitive Hashing Instructor: Thomas Kesselheim and Kurt Mehlhorn 1 Notation Lecture 4 (6 pages) When e talk about the probability of an event,
More informationElementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q),
Elementary 2-Group Character Codes Cunsheng Ding 1, David Kohel 2, and San Ling Abstract In this correspondence we describe a class of codes over GF (q), where q is a power of an odd prime. These codes
More information(each row defines a probability distribution). Given n-strings x X n, y Y n we can use the absence of memory in the channel to compute
ENEE 739C: Advanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 6 (draft; 9/6/03. Error exponents for Discrete Memoryless Channels http://www.enee.umd.edu/ abarg/enee739c/course.html
More informationThe coset leader and list weight enumerator
Contemporary Mathematics The coset leader and list weight enumerator Relinde Jurrius and Ruud Pellikaan In Topics in Finite Fields 11th International Conference on Finite Fields and their Applications
More informationIN [1] Kiermaier and Zwanzger construct the extended dualized Kerdock codes ˆK
New upper bounds on binary linear codes and a Z 4 -code with a better-than-linear Gray image Michael Kiermaier, Alfred Wassermann, and Johannes Zwanzger 1 arxiv:1503.03394v2 [cs.it] 16 Mar 2016 Abstract
More informationChapter 3 Linear Block Codes
Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and
More informationON PERTURBATION OF BINARY LINEAR CODES. PANKAJ K. DAS and LALIT K. VASHISHT
Math Appl 4 (2015), 91 99 DOI: 1013164/ma201507 ON PERTURBATION OF BINARY LINEAR CODES PANKAJ K DAS and LALIT K VASHISHT Abstract We present new codes by perturbation of rows of the generating matrix of
More informationMatrix characterization of linear codes with arbitrary Hamming weight hierarchy
Linear Algebra and its Applications 412 (2006) 396 407 www.elsevier.com/locate/laa Matrix characterization of linear codes with arbitrary Hamming weight hierarchy G. Viswanath, B. Sundar Rajan Department
More informationMATH 291T CODING THEORY
California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt
More informationOn a generalized combinatorial conjecture involving addition mod 2 k 1
On a generalized combinatorial conjecture involving addition mod k 1 Gérard Cohen Jean-Pierre Flori Tuesday 14 th February, 01 Abstract In this note, e give a simple proof of the combinatorial conjecture
More informationMATH/MTHE 406 Homework Assignment 2 due date: October 17, 2016
MATH/MTHE 406 Homework Assignment 2 due date: October 17, 2016 Notation: We will use the notations x 1 x 2 x n and also (x 1, x 2,, x n ) to denote a vector x F n where F is a finite field. 1. [20=6+5+9]
More informationOn Secret Sharing Schemes, Matroids and Polymatroids
On Secret Sharing Schemes, Matroids and Polymatroids Jaume Martí-Farré, Carles Padró Dep. de Matemàtica Aplicada 4, Universitat Politècnica de Catalunya, Barcelona, Spain {jaumem,cpadro}@ma4.upc.edu June
More informationEE 229B ERROR CONTROL CODING Spring 2005
EE 229B ERROR CONTROL CODING Spring 2005 Solutions for Homework 1 1. Is there room? Prove or disprove : There is a (12,7) binary linear code with d min = 5. If there were a (12,7) binary linear code with
More informationREPRESENTATIONS FOR A SPECIAL SEQUENCE
REPRESENTATIONS FOR A SPECIAL SEQUENCE L. CARLITZ* RICHARD SCOVILLE Dyke University, Durham,!\!orth Carolina VERNERE.HOGGATTJR. San Jose State University, San Jose, California Consider the sequence defined
More informationCorrecting Codes in Cryptography
EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.
More informationMATH32031: Coding Theory Part 15: Summary
MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,
More informationWeek 3: January 22-26, 2018
EE564/CSE554: Error Correcting Codes Spring 2018 Lecturer: Viveck R. Cadambe Week 3: January 22-26, 2018 Scribe: Yu-Tse Lin Disclaimer: These notes have not been subjected to the usual scrutiny reserved
More informationOrthogonal Arrays & Codes
Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible
More informationChapter 5. Cyclic Codes
Wireless Information Transmission System Lab. Chapter 5 Cyclic Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Description of Cyclic Codes Generator and Parity-Check
More informationOn the representability of the bi-uniform matroid
On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 1, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large
More informationMINIMAL CODEWORDS IN LINEAR CODES. Yuri Borissov, Nickolai Manev
Serdica Math. J. 30 (2004, 303 324 MINIMAL CODEWORDS IN LINEAR CODES Yuri Borissov, Nickolai Manev Communicated by V. Brînzănescu Abstract. Cyclic binary codes C of block length n = 2 m 1 and generator
More informationCodes over Subfields. Chapter Basics
Chapter 7 Codes over Subfields In Chapter 6 we looked at various general methods for constructing new codes from old codes. Here we concentrate on two more specialized techniques that result from writing
More informationError Correcting Index Codes and Matroids
Error Correcting Index Codes and Matroids Anoop Thomas and B Sundar Rajan Dept of ECE, IISc, Bangalore 5612, India, Email: {anoopt,bsrajan}@eceiiscernetin arxiv:15156v1 [csit 21 Jan 215 Abstract The connection
More informationLIFTED CODES OVER FINITE CHAIN RINGS
Math. J. Okayama Univ. 53 (2011), 39 53 LIFTED CODES OVER FINITE CHAIN RINGS Steven T. Dougherty, Hongwei Liu and Young Ho Park Abstract. In this paper, we study lifted codes over finite chain rings. We
More informationTHE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES. Changwoo Lee. 1. Introduction
Commun. Korean Math. Soc. 18 (2003), No. 1, pp. 181 192 THE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES Changwoo Lee Abstract. We count the numbers of independent dominating sets of rooted labeled
More informationCOS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008
COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008 In the previous lecture, e ere introduced to the SVM algorithm and its basic motivation
More informationVector spaces. EE 387, Notes 8, Handout #12
Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is
More informationBinary codes from rectangular lattice graphs and permutation decoding
Binary codes from rectangular lattice graphs and permutation decoding J. D. Key a,,1 P. Seneviratne a a Department of Mathematical Sciences, Clemson University, Clemson SC 29634, U.S.A. Abstract We examine
More informationA Relation Between Weight Enumerating Function and Number of Full Rank Sub-matrices
A Relation Between Weight Enumerating Function and Number of Full Ran Sub-matrices Mahesh Babu Vaddi and B Sundar Rajan Department of Electrical Communication Engineering, Indian Institute of Science,
More informationSecret-sharing with a class of ternary codes
Theoretical Computer Science 246 (2000) 285 298 www.elsevier.com/locate/tcs Note Secret-sharing with a class of ternary codes Cunsheng Ding a, David R Kohel b, San Ling c; a Department of Computer Science,
More informationSQUARES AND DIFFERENCE SETS IN FINITE FIELDS
SQUARES AND DIFFERENCE SETS IN FINITE FIELDS C. Bachoc 1 Univ Bordeaux, Institut de Mathématiques de Bordeaux, 351, cours de la Libération 33405, Talence cedex, France bachoc@math.u-bordeaux1.fr M. Matolcsi
More information3. Coding theory 3.1. Basic concepts
3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,
More informationSome Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes
Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Nuh Aydin and Tsvetan Asamov Department of Mathematics Kenyon College Gambier, OH 43022 {aydinn,asamovt}@kenyon.edu
More informationTUTTE POLYNOMIALS OF GENERALIZED PARALLEL CONNECTIONS
TUTTE POLYNOMIALS OF GENERALIZED PARALLEL CONNECTIONS JOSEPH E. BONIN AND ANNA DE MIER ABSTRACT. We use weighted characteristic polynomials to compute Tutte polynomials of generalized parallel connections
More informationConstruction of a (64, 2 37, 12) Code via Galois Rings
Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T
More informationarxiv: v2 [math.co] 17 May 2017
New nonbinary code bounds based on divisibility arguments Sven Polak 1 arxiv:1606.05144v [math.co] 17 May 017 Abstract. For q, n, d N, let A q (n, d) be the maximum size of a code C [q] n with minimum
More informationNewton, Fermat, and Exactly Realizable Sequences
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 8 (2005), Article 05.1.2 Newton, Fermat, and Exactly Realizable Sequences Bau-Sen Du Institute of Mathematics Academia Sinica Taipei 115 TAIWAN mabsdu@sinica.edu.tw
More informationA classification of MDS binary systematic codes
A classification of MDS binary systematic codes Eleonora Guerrini (guerrini@science.unitn.it) Department of Mathematics, University of Trento, Italy. Massimiliano Sala (msala@bcri.ucc.ie) Boole Centre
More informationThe generalized order-k Fibonacci Pell sequence by matrix methods
Journal of Computational and Applied Mathematics 09 (007) 33 45 wwwelseviercom/locate/cam The generalized order- Fibonacci Pell sequence by matrix methods Emrah Kilic Mathematics Department, TOBB University
More informationMath 512 Syllabus Spring 2017, LIU Post
Week Class Date Material Math 512 Syllabus Spring 2017, LIU Post 1 1/23 ISBN, error-detecting codes HW: Exercises 1.1, 1.3, 1.5, 1.8, 1.14, 1.15 If x, y satisfy ISBN-10 check, then so does x + y. 2 1/30
More informationOn Linear Subspace Codes Closed under Intersection
On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F
More informationConstructions of Quadratic Bent Functions in Polynomial Forms
1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence
More informationEstimates of the Distance Distribution of Codes and Designs
1050 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 Estimates of the Distance Distribution of Codes Designs Alexei Ashikhmin, Member, IEEE, Alexer Barg, Senior Member, IEEE, Simon
More informationFRACTIONAL PACKING OF T-JOINS. 1. Introduction
FRACTIONAL PACKING OF T-JOINS FRANCISCO BARAHONA Abstract Given a graph with nonnegative capacities on its edges, it is well known that the capacity of a minimum T -cut is equal to the value of a maximum
More informationNeighborly families of boxes and bipartite coverings
Neighborly families of boxes and bipartite coverings Noga Alon Dedicated to Professor Paul Erdős on the occasion of his 80 th birthday Abstract A bipartite covering of order k of the complete graph K n
More informationMATH 291T CODING THEORY
California State University, Fresno MATH 291T CODING THEORY Fall 2011 Instructor : Stefaan Delcroix Contents 1 Introduction to Error-Correcting Codes 3 2 Basic Concepts and Properties 6 2.1 Definitions....................................
More informationPisano period codes. Ministry of Education, Anhui University No. 3 Feixi Road, Hefei Anhui Province , P. R. China;
Pisano period codes Minjia Shi 1,2,3, Zhongyi Zhang 4, and Patrick Solé 5 1 Key Laboratory of Intelligent Computing & Signal Processing, arxiv:1709.04582v1 [cs.it] 14 Sep 2017 Ministry of Education, Anhui
More information3 - Vector Spaces Definition vector space linear space u, v,
3 - Vector Spaces Vectors in R and R 3 are essentially matrices. They can be vieed either as column vectors (matrices of size and 3, respectively) or ro vectors ( and 3 matrices). The addition and scalar
More informationWhich Codes Have 4-Cycle-Free Tanner Graphs?
Which Codes Have 4-Cycle-Free Tanner Graphs? Thomas R. Halford Communication Sciences Institute University of Southern California Los Angeles, CA 90089-565 USA Alex J. Grant Institute for Telecommunications
More informationLinear models: the perceptron and closest centroid algorithms. D = {(x i,y i )} n i=1. x i 2 R d 9/3/13. Preliminaries. Chapter 1, 7.
Preliminaries Linear models: the perceptron and closest centroid algorithms Chapter 1, 7 Definition: The Euclidean dot product beteen to vectors is the expression d T x = i x i The dot product is also
More informationFormally self-dual additive codes over F 4
Formally self-dual additive codes over F Sunghyu Han School of Liberal Arts, Korea University of Technology and Education, Cheonan 0-708, South Korea Jon-Lark Kim Department of Mathematics, University
More informationGraphs with prescribed star complement for the. eigenvalue.
Graphs with prescribed star complement for the eigenvalue 1 F. Ramezani b,a B. Tayfeh-Rezaie a,1 a School of Mathematics, IPM (Institute for studies in theoretical Physics and Mathematics), P.O. Box 19395-5746,
More informationCover Page. The handle holds various files of this Leiden University dissertation
Cover Page The handle http://hdl.handle.net/1887/57796 holds various files of this Leiden University dissertation Author: Mirandola, Diego Title: On products of linear error correcting codes Date: 2017-12-06
More informationBounds for binary codes with narrow distance distributions
Bounds for binary codes with narrow distance distributions Ron M Roth, Gadiel Seroussi Advanced Studies HP Laboratories Palo Alto HPL-006-136 September 9, 006* constant-weight codes, distance distribution,
More information11 Minimal Distance and the Parity Check Matrix
MATH32031: Coding Theory Part 12: Hamming Codes 11 Minimal Distance and the Parity Check Matrix Theorem 23 (Distance Theorem for Linear Codes) Let C be an [n, k] F q -code with parity check matrix H. Then
More informationPermutation groups/1. 1 Automorphism groups, permutation groups, abstract
Permutation groups Whatever you have to do with a structure-endowed entity Σ try to determine its group of automorphisms... You can expect to gain a deep insight into the constitution of Σ in this way.
More informationA Characterization of (3+1)-Free Posets
Journal of Combinatorial Theory, Series A 93, 231241 (2001) doi:10.1006jcta.2000.3075, available online at http:www.idealibrary.com on A Characterization of (3+1)-Free Posets Mark Skandera Department of
More informationAlgebraic Methods in Combinatorics
Algebraic Methods in Combinatorics Po-Shen Loh 27 June 2008 1 Warm-up 1. (A result of Bourbaki on finite geometries, from Răzvan) Let X be a finite set, and let F be a family of distinct proper subsets
More informationAn Extremal Doubly Even Self-Dual Code of Length 112
An Extremal Doubly Even Self-Dual Code of Length 112 Masaaki Harada Department of Mathematical Sciences Yamagata University Yamagata 990 8560, Japan mharada@sci.kj.yamagata-u.ac.jp Submitted: Dec 29, 2007;
More informationVector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition)
Vector Space Basics (Remark: these notes are highly formal and may be a useful reference to some students however I am also posting Ray Heitmann's notes to Canvas for students interested in a direct computational
More informationCodes and Rings: Theory and Practice
Codes and Rings: Theory and Practice Patrick Solé CNRS/LAGA Paris, France, January 2017 Geometry of codes : the music of spheres R = a finite ring with identity. A linear code of length n over a ring R
More informationStatistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study
International Journal of Foundations of Computer Science c World Scientific Publishing Company Statistical Properties of the Arithmetic Correlation of Sequences Mark Goresky School of Mathematics Institute
More informationELEMENTARY SUBALGEBRAS OF RESTRICTED LIE ALGEBRAS
ELEMENTARY SUBALGEBRAS OF RESTRICTED LIE ALGEBRAS J. WARNER SUMMARY OF A PAPER BY J. CARLSON, E. FRIEDLANDER, AND J. PEVTSOVA, AND FURTHER OBSERVATIONS 1. The Nullcone and Restricted Nullcone We will need
More informationOn the Correlation Distribution of Delsarte Goethals Sequences
On the Correlation Distribution of Delsarte Goethals Seuences Kai-Uwe Schmidt 9 July 009 (revised 01 December 009) Abstract For odd integer m 3 and t = 0, 1,..., m 1, we define Family V (t) to be a set
More informationThe Binary Self-Dual Codes of Length Up To 32: A Revised Enumeration*
The Binary Self-Dual Codes of Length Up To 32: A Revised Enumeration* J. H. Conway Mathematics Department Princeton University Princeton, New Jersey 08540 V. Pless** Mathematics Department University of
More informationExtending MDS Codes. T. L. Alderson
Extending MDS Codes T. L. Alderson Abstract A q-ary (n,k)-mds code, linear or not, satisfies n q + k 1. A code meeting this bound is said to have maximum length. Using purely combinatorial methods we show
More informationELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes
ELEC 519A Selected Topics in Digital Communications: Information Theory Hamming Codes and Bounds on Codes Single Error Correcting Codes 2 Hamming Codes (7,4,3) Hamming code 1 0 0 0 0 1 1 0 1 0 0 1 0 1
More information