A shortening of C on the coordinate i is the [n 1, k 1, d] linear code obtained by leaving only such codewords and deleting the ith coordinate.

Size: px
Start display at page:

Download "A shortening of C on the coordinate i is the [n 1, k 1, d] linear code obtained by leaving only such codewords and deleting the ith coordinate."

Transcription

1 ENEE 739C: Advanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 6a (draft; 9/21/03. Linear codes. Weights, supports, ranks. abarg/enee739c/course.html The goal of this lecture is to study general properties of linear codes. Let C be a q-ary [n, k] code ith eight distribution {A i, i 0, 1,..., n}. Let G, H be a generator and a parity-check matrix of C. The dual code C is the set C {x H n q : Hx T 0}. Let i be a not all-zero coordinate. We have {c C : c i 0} 1 q C A shortening of C on the coordinate i is the [n 1, k 1, d] linear code obtained by leaving only such codeords and deleting the ith coordinate. Let [n] : {1,..., n}, E [n], Ē [n]\e. For a matrix M ith n columns e denote by M(E the submatrix formed by all the columns ith numbers in E. The support of a vector x Hq n is defined as supp(x {i : x i 0}. Given a subcode A C, its support is supp(a {i [n] : a A a i 0} A shortening of C on the coordinates in Ē is a linear code CE such that x C E supp(x E. A projection of C on the coordinates in Ē, also called puncturing, is a restriction of C to the coordinates in E (simply said, deleting the coorinates in Ē from every codevector of C and deleting repeated entries from the result. The basic facts about shortenings and puncturings are given in the folloing Theorem 1. (i If t d(c 1, then C E is an [n t, k, d(c t] code. (ii dim C E E rk(h(e, dim(c E rk(g(e, dim(c E + dim((c E E. (iii C E C/CĒ. (iv (C E (C E ; (C E (C E. Proof : (i, (iii are obvious. (ii is counting the number of solutions of a system of linear equations. Let us prove the first part of (iv. Let a (C E, then G(Ea T 0, so a (C E. Further, by (ii The second part of (iv is analogous. dim(c E E rk(g(e E dim C E dim(c E. Recall the notation for the Gaussian binomial coefficient: [ ] k 1 n q n i 1 k q k i 1 In other ords, [ ] n [n] k [k][n k] u 1 here [u] (q u 1. Lemma 2. The number of linear [n, k] codes is [ n k]. Proof : [ ] n k equals the number of choices of k linearly independent vectors in H n q divided by the number of different bases of an [n, k] code. Lemma 3. Let E. Then (1 E rk(h(e k rk(g(ē 1

2 2 Proof : Let C E proj E C be the projection of C on the coordinates in E. Clearly, dim C E rk(g(e. On the other hand, C E C/CĒ by Theorem 1(iii; hence by (ii dim C E k dim CĒ k E + rk(h(ē. This lemma bridges linear codes ith the branch of combinatorics knon as matroid theory. It turns out that it is possible to abstract from the linear-algebraic setting and define dependencies axiomatically. One starts ith a finite set [n] and calls some of its subsets independent, making sure they satisfy the same set of natural conditions that the subsets of linearly independent vectors ould. Then for any subset E n one defines its rank as the size of a maximum independent subset contained in it. A large number of properties of independent sets and other subsets can be proved in this purely axiomatic setting, see [18]. Matroid theory finds uses in coding theory [4, 6], cryptography [5], information theory [10], multiuser communication [17] graph theory, topology [11]. Even though e ill not use this here, e ish to point out that this lemma contains the MacWilliams identities in disguise. Recall that ENEE722 gives a different proof of these identities, via the Fourier transform. Both proofs are due to F. J. MacWilliams [15]. Let n, i be nonnegative integers. Recall that n(n 1...(n i+1 i! i n 1 i 0 i 0 otherise In partilucar, ( 0 i δ0,i. Lemma 4. (The MacWilliams identities n u i u i (2 A i C q u A i. u n u Proof : We have the folloing chain of equalities: n u i (3 A i u E n u E n u (C E q n k u q n u rk(g(e E n u q u rk(h(ē u i q n k u A i. n u Here the first equality follos by counting in to ays the size of the set {(E, c : E n u and c (C E, t(c n u}, the second one is straightforard, the third one (the central step in the proof is implied by Lemma 3, and the final step follos by the same argument as the first one. A familiar form of these identities is obtained by using the eight enumerators of the code C and its dual code C. We have A(x, y 1 C A(x + (y, x y. The MacWilliams identities exist in a variety of different forms, see [13]. Remark. You should be aare that the linear-algebraic approach to the MacWilliams identities is only one of a number of possible points of vie. First of all, a substantial portion of the results above can be extended to nonlinear codes [16, Ch.5,6]. A combinatorial perspective is given in P. Delsarte [8], see also

3 3 [16, Ch. 21], [9]. An approach via harmonic analysis is given in G. Kabatiansky and V. Levenshtein [14], see also [7, Ch.9]. Binomial moments of the eight distribution. The quantities i C A i ( 0, 1,..., n n are called binomial moments of the eight distribution of the code C. We have seen (3 that C q dim(ce. E Clearly for an [n, k, d] code, C 0 1, C ( n, 1,..., d 1. It is possible to express the eight coefficients via the binomial moments. Lemma 5. Proof : A i i ( 1 i C. n i i ( 1 i C n i i j ( 1 i A j n i n i A j j0 i j0 A i j0 j ( ( n n j ( 1 i n i n A j ( n j n i j ( i j ( 1 i i Lemma 6. Let A(x, y be the eight enumerator of C and let C(x, y n C x n y. Proof : From (2 n C (x y n y A(x, y C(x y, y n n C y ( 1 n j x j y n j j j0 n n j x j y n j ( 1 n j C j j0 { } i n j n x n i y i A i. C n u q n k u C u n x j y n j j0 i ( 1 i n i (u 0,..., n. Introducing the eight enumerators C(x, y C i x n i y i, C (x, y C i xn i y i e then have C n u x n u y u q k C u (xq n u y u C C (y, x q k C(qx, y, a remarkably simple form of the MacWilliams equation.

4 4 An interesting observation about the binomial moments is that hile it is not possible to bound belo individual coefficients of the eight distribution, it is possible to do this for linear combinations of these coefficients (binomial moments. Here is one possibility: Theorem 7. Proof : Let E [n]. We have C dim(c E E rk(h(e q max(0, n+k q min(,n k q max(0, n+k This result can be applied to bounding the probability of undetected error P u of a linear [n, k] code. We have Theorem 8. [1] Let C be an [n, k] linear q-ary code. n ( p ( P u (q n+k 1 1 q n p. n k+1 Proof : From the previous theorem, Then C max(0, q n+k 1. p ( P u (C A(1 p, (1 pn C 1 p q, p n ( p ( C 1 q n p n ( p n ( p ( (C 1 q n p n ( p ( max(0, q n+k 1 1 q n p (1 p n ( 1 q p n In many cases the results of the last to theorems can be improved and generalized (to nonlinear codes, see [3]. The next exercise is the first step along this ay. Exercise. (Forget the 0 Try to define binomial moments of the distance distribution C for an unrestricted (i.e., not necessarily linear binary code C. Begin ith the folloing question: hat is the support of a subcode? (Hint: start ith subcodes of size 2. Prove that Lemma 6 still holds true, ith A(x, y replaced by the distance enumerator B(x, y. The rank function. Rerite (3 by collecting on the right-hand side subsets of one and the same rank. Namely, let U v u {E {1, 2,..., n} E u, rk(g(e v}. For instance, U k k (4 is the number of information sets of the code C. By (3 and Theorem 1(ii e have k n i A i q v (U v n, here the numbers U are the rank coefficients of C. Further, Lemma 3 implies that (5 (U u k+v u v0 U v n u. The last to equations relate the eight enumerator of C and its rank distribution (U v u, 0 u n, 0 v k.

5 5 Example. (MDS codes An (n, M, d code is called maximum distance separable (MDS if M q n d+1. Let C be an [n, k, n k+1] q-ary linear MDS code ith a parity-check matrix H. Then rk(h(e min{ E, n k} for all E S, 0 E n k. Therefore {( n (U v u u if (0 v u n k or (u n k + 1, v n k; 0 otherise. This enables us to compute the eight spectrum of C. Substituting the values of (U v u into (4, e obtain A 0 1, A i 0 for 1 i n k, and l 1 k + l A n k+l ( 1 j (q l j 1 (1 l k. k l j j0 Definition 1. The rank polynomial of a linear code C is U(x, y n u0 v0 k Uux v u y v. Relations of the rank polynomial of C, its dual code C, and the eight polynomial of C are given by the folloing results. Theorem 9. Proof : We have (6 (7 U (x, y ( 1 U (x, y x n y dim C U xy, y. n n k (U v ux u y v u0 v0 u0 v0 n n k Un u k u+v x u y v (by (5 u0 v0 n n k x n Uu k n+u+v x u y v n n k x n y n k Uu u v (xy u y u v x n y n k n u0 v0 u u0 vu n+k U v u(xy u y v. No let E n u, rk(g(ē v. Then Ē u and by (1 0 rk(h(e E k + v v (u n + k. Hence, for 0 v u n + k 1 e have U v u 0. Thus, the summation interval of v in (7 can be extended to 0 v u. Theorem 10. ( x y A(x, y y n C U, 1 y q (x y n U ( qy x y, 1. q Information profile of a linear code. Let C be a linear code, [n] {1,..., n}, E [n]. Consider the average (over the choice of E dimension of the code C E : ( 1 n e dim(c E. E ( [n] The number e can be thought of an the average information content of a -subset.

6 6 The numbers (e, 1,..., n constitute the information profile of the code C. Since dim(c E rk(g(e, here G is the generator matrix of C, e can also rite e iu i (C. The information profile as introduced for its one sake in [12] and as used recently in analyzing iterative decoding. Paper [12] also computes the average value of e over all [n, k] codes. Minimal vectors in linear codes. For the vectors x, y Hq n e rite x y (x y if supp(x supp(y (resp., supp(x supp(y. Definition 2. Let C Hq n be a linear code. A nonzero vector c C is called minimal if 0 c c implies c ac here c is another codevector and a is a constant. In ords: nonminimal vector covers a nonzero vector ith a smaller support. Let H be a parity-check matrix of C and let M be the set of its minimal vectors. Let us list basic properties of minimal vectors. Lemma 11. (i Let c C, U supp(c. Then c M if and only if rk(h(u U 1. (ii (U is minimal ( U n k + 1. (iii Every support of size U d(1 + 1 q 1 1 is minimal. (iv The linear span (the set of all linear combinations of M(C coincides ith C. Moreover, if q 2 then every nonzero codevector can be decomposed into a sum of minimal vectors ith pairise disjoint supports. (v Let C be a binary code. Then if c C, c M(C, then there is a pair of nonzero code vectors c 1 c and c 2 c ith disjoint supports such that c c 1 + c 2. Proof : The only if part of (1 is obvious. Let us prove the converse. Let h i be the ith column of H(U. By assumption, there exist U nonzero numbers λ i such that λ i h i 0 i1 and some 1 of these columns, say the first, are linearly independent. Suppose there exists a code vector c, c c, i.e., there exists a vanishing linear combination of columns that does not involve at least one of the first 1 columns, for instance, µ i h i 0 i2 ith µ 0. Multiply this sum by λ /µ and subtract from the first one. This gives a linear dependence beteen the first 1 columns, a contradiction. Part (ii is implied by (i. To prove part (iii, suppose that c C is a nonminimal vector of eight t(c d ( 1 + q and let c c, c C\{0}. Consider code vectors c ac, here a runs over all nonzero constants. Summing up their eights, e get ( t(c t(c. Thus, their average eight is t(c ( 1 t(c. One of these vectors, say c has eight at most the average. Together ith our assumption this implies a contradiction: t(c t(c t(c d( d 1 d 1. Part (iv Let c C\{0}. Suppose it is not minimal, then there is a minimal vector m 1 such that supp(m 1 supp(c. There alays is a nonzero constant a 1 such that (c a 1 m 1 c. Denote c 1 c a 1 m 1. By the same argument, either c 1 is minimal or there is an m 2 M such that (c 1 a 2 m 2 c 1. Since the

7 7 size of the support falls by (at least one in every step, for a certain i, the vector c i ill be minimal. Then c i c i 1 j1 a jc j. Part (v is obvious. Ho many minimal vectors are there in a typical linear code? Consider the ensemble given by random (n k n parity-check matrices. Let EM be the expected number of minimal vectors of eight. Theorem 12. [2] Let n k + 1. Then ( 2 EM q n k (1 q (n k i. VarM EM (1 + 2 d/2 EM. For the proof consult the source. In particular, this theorem implies that for n almost all vectors of eight n k + 1 in a typical linear code are minimal. The main uses of minimal vectors are in decoding of linear codes and cryptography (access structures in secret sharing schemes. Example: Let C be an [n qm 1 q 1, n m 1, 3] Hamming code. We have M 1 2 (q m q i, (3 m + 1.! Proof: Consider s 1 linearly independent columns in the parity-check matrix H of the code C. The total number of linear combinations of these columns ith nonzero coefficients equals ( s ; the 1/(q 1th fraction of them appear as columns in H distinct from the chosen columns (since they are linearly independent. Every choice of linearly dependent columns of hich s 1 are linearly independent, defines a minimal codeord. Thus, one has to count the number of distinct choices of s linearly independent columns in H. This number equals 1 ( s! n(n 1 n q2 1 (... n qs 1 1 Taking into account that all the ( 1 choices of 1 linearly independent columns ithin a given support of size yield one and the same codeord, e find that the number of minimal codeords of eight in the code equals 1 ( B ( 1! n(n 1 n q2 1 (... n qs 1 1 ( s, The substitution of the value of n gives the desired result. References 1. K. A. S. Abdel-Ghaffar, A loer bound on the undetected error probability and strictly optimal codes, IEEE Trans. Inform. Theory (1997, no. 5, A. Ashikhmin and A. Barg, Minimal vectors in linear codes, IEEE Trans. Inform. Theory 44 (1998, no. 5, , Binomial moments of the distance distribution: Bounds and applications, IEEE Trans. Inform. Theory 45 (1999, no. 2, A. Barg, The matroid of supports of a linear code, Appl. Alg. Engrg. Commun. Comput. 8 (1997, E. F. Brickell and D. M. Davenport, On the classification of ideal secret sharing schemes, J. Cryptology 4 (1991, T Britz, MacWilliams identities and matroid polynomials, Electron. J. Combin. 9 (2002, #R J. H. Conay and N. J. A. Sloane, Sphere packings, lattices and groups, Springer-Verlag, Ne York-Berlin, P. Delsarte, An algebraic approach to the association schemes of coding theory, Philips Research Repts Suppl. 10 (1973, P. Delsarte and V. I. Levenshtein, Association schemes and coding theory, IEEE Trans. Inform. Theory 44 (1998, no. 6, S. Fujishige, Entropy functions and polymatroids combinatorial structures in information theory, Electron. Comm. Japan 61 (1978, no. 4, I. M. Gel fand and R. D. MacPherson, A combinatorial formula for the Pontrjagin classes, Bull. Amer. Math. Soc. (N.S. 26 (1992, no. 2,

8 8 12. T. Helleseth, T. Kløve, and V. I. Levenshtein, On the information function of an error-correcting code, IEEE Trans. Inform. Theory 43 (1997, no. 2, W. C. Huffman and V. Pless, Fundamentals of error-correcting codes, Ne York: Cambridge University Press, G. Kabatyansky and V. I. Levenshtein, Bounds for packings on the sphere and in the space, Problems of Information Transmission 14 (1978, no. 1, F. J. MacWilliams, A theorem in the distribution of eights in a systematic code, Bell Syst. Techn. Journ. 42 (1963, F. J. MacWilliams and N. J. A. Sloane, The theory of error-correcting codes, 3 ed., North-Holland, Amsterdam, D. N. C. Tse and S. V. Hanly, Multiaccess fading channels. I. Polymatroid structure, optimal resource allocation and throughput capacities, IEEE Trans. Inform. Theory 44 (1998, D. J. A. Welsh, Matroid theory, Academic Press, London, 1976.

Average Coset Weight Distributions of Gallager s LDPC Code Ensemble

Average Coset Weight Distributions of Gallager s LDPC Code Ensemble 1 Average Coset Weight Distributions of Gallager s LDPC Code Ensemble Tadashi Wadayama Abstract In this correspondence, the average coset eight distributions of Gallager s LDPC code ensemble are investigated.

More information

Support weight enumerators and coset weight distributions of isodual codes

Support weight enumerators and coset weight distributions of isodual codes Support weight enumerators and coset weight distributions of isodual codes Olgica Milenkovic Department of Electrical and Computer Engineering University of Colorado, Boulder March 31, 2003 Abstract In

More information

Arrangements, matroids and codes

Arrangements, matroids and codes Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde

More information

On non-antipodal binary completely regular codes

On non-antipodal binary completely regular codes On non-antipodal binary completely regular codes J. Borges, J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, 08193-Bellaterra, Spain. V.A. Zinoviev Institute

More information

The Witt designs, Golay codes and Mathieu groups

The Witt designs, Golay codes and Mathieu groups The Witt designs, Golay codes and Mathieu groups 1 The Golay codes Let V be a vector space over F q with fixed basis e 1,..., e n. A code C is a subset of V. A linear code is a subspace of V. The vector

More information

Lecture 2 Linear Codes

Lecture 2 Linear Codes Lecture 2 Linear Codes 2.1. Linear Codes From now on we want to identify the alphabet Σ with a finite field F q. For general codes, introduced in the last section, the description is hard. For a code of

More information

The Hamming Codes and Delsarte s Linear Programming Bound

The Hamming Codes and Delsarte s Linear Programming Bound The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the

More information

Quantum Error Detection I: Statement of the Problem

Quantum Error Detection I: Statement of the Problem 778 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 46, NO 3, MAY 2000 Quantum Error Detection I: Statement of the Problem Alexei E Ashikhmin, Alexander M Barg, Emanuel Knill, and Simon N Litsyn, Member,

More information

On the Griesmer bound for nonlinear codes

On the Griesmer bound for nonlinear codes On the Griesmer bound for nonlinear codes Emanuele Bellini, Alessio Meneghetti To cite this version: Emanuele Bellini, Alessio Meneghetti. On the Griesmer bound for nonlinear codes. Pascale Charpin, Nicolas

More information

Hamming codes and simplex codes ( )

Hamming codes and simplex codes ( ) Chapter 6 Hamming codes and simplex codes (2018-03-17) Synopsis. Hamming codes are essentially the first non-trivial family of codes that we shall meet. We start by proving the Distance Theorem for linear

More information

Open Questions in Coding Theory

Open Questions in Coding Theory Open Questions in Coding Theory Steven T. Dougherty July 4, 2013 Open Questions The following questions were posed by: S.T. Dougherty J.L. Kim P. Solé J. Wood Hilbert Style Problems Hilbert Style Problems

More information

Matroids/1. I and I 2 ,I 2 > I 1

Matroids/1. I and I 2 ,I 2 > I 1 Matroids 1 Definition A matroid is an abstraction of the notion of linear independence in a vector space. See Oxley [6], Welsh [7] for further information about matroids. A matroid is a pair (E,I ), where

More information

ON LINEAR ORDERED CODES

ON LINEAR ORDERED CODES ON LINEAR ORDERED CODES ALEXANDER BARG AND WOOMYOUNG PARK ABSTRACT We consider linear codes in the metric space with the Niederreiter-Rosenbloom-Tsfasman NRT metric, calling them linear ordered codes In

More information

On the properness of some optimal binary linear codes and their dual codes

On the properness of some optimal binary linear codes and their dual codes Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 76-81 On the properness of some optimal binary linear codes and their dual codes Rossitza

More information

A NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1

A NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1 BULLETIN (New Series) OF THE AMERICAN MATHEMATICAL SOCIETY Volume 23, Number 2, October 1990 A NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1 J. H. CONWAY AND N. J. A. SLOANE ABSTRACT.

More information

PAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES

PAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES International Journal of Pure and Applied Mathematics Volume 85 No. 6 013, 1001-1008 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/10.173/ijpam.v85i6.3

More information

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum 1997 19 CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION 3.0. Introduction

More information

Permutation decoding for the binary codes from triangular graphs

Permutation decoding for the binary codes from triangular graphs Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for

More information

Improved Upper Bounds on Sizes of Codes

Improved Upper Bounds on Sizes of Codes 880 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 4, APRIL 2002 Improved Upper Bounds on Sizes of Codes Beniamin Mounits, Tuvi Etzion, Senior Member, IEEE, and Simon Litsyn, Senior Member, IEEE

More information

The cocycle lattice of binary matroids

The cocycle lattice of binary matroids Published in: Europ. J. Comb. 14 (1993), 241 250. The cocycle lattice of binary matroids László Lovász Eötvös University, Budapest, Hungary, H-1088 Princeton University, Princeton, NJ 08544 Ákos Seress*

More information

Some codes related to BCH-codes of low dimension

Some codes related to BCH-codes of low dimension Discrete Mathematics 205 (1999) 57 64 www.elsevier.com/locate/disc Some codes related to BCH-codes of low dimension Yves Edel a,jurgen Bierbrauer b; a Mathematisches Institut der Universitat, Im Neuenheimer

More information

A Combinatorial Bound on the List Size

A Combinatorial Bound on the List Size 1 A Combinatorial Bound on the List Size Yuval Cassuto and Jehoshua Bruck California Institute of Technology Electrical Engineering Department MC 136-93 Pasadena, CA 9115, U.S.A. E-mail: {ycassuto,bruck}@paradise.caltech.edu

More information

On the adjacency matrix of a block graph

On the adjacency matrix of a block graph On the adjacency matrix of a block graph R. B. Bapat Stat-Math Unit Indian Statistical Institute, Delhi 7-SJSS Marg, New Delhi 110 016, India. email: rbb@isid.ac.in Souvik Roy Economics and Planning Unit

More information

The degree sequence of Fibonacci and Lucas cubes

The degree sequence of Fibonacci and Lucas cubes The degree sequence of Fibonacci and Lucas cubes Sandi Klavžar Faculty of Mathematics and Physics University of Ljubljana, Slovenia and Faculty of Natural Sciences and Mathematics University of Maribor,

More information

An Analytic Approach to the Problem of Matroid Representibility: Summer REU 2015

An Analytic Approach to the Problem of Matroid Representibility: Summer REU 2015 An Analytic Approach to the Problem of Matroid Representibility: Summer REU 2015 D. Capodilupo 1, S. Freedman 1, M. Hua 1, and J. Sun 1 1 Department of Mathematics, University of Michigan Abstract A central

More information

Codes from lattice and related graphs, and permutation decoding

Codes from lattice and related graphs, and permutation decoding Codes from lattice and related graphs, and permutation decoding J. D. Key School of Mathematical Sciences University of KwaZulu-Natal Pietermaritzburg 3209, South Africa B. G. Rodrigues School of Mathematical

More information

arxiv: v4 [cs.it] 14 May 2013

arxiv: v4 [cs.it] 14 May 2013 arxiv:1006.1694v4 [cs.it] 14 May 2013 PURE ASYMMETRIC QUANTUM MDS CODES FROM CSS CONSTRUCTION: A COMPLETE CHARACTERIZATION MARTIANUS FREDERIC EZERMAN Centre for Quantum Technologies, National University

More information

Math 249B. Geometric Bruhat decomposition

Math 249B. Geometric Bruhat decomposition Math 249B. Geometric Bruhat decomposition 1. Introduction Let (G, T ) be a split connected reductive group over a field k, and Φ = Φ(G, T ). Fix a positive system of roots Φ Φ, and let B be the unique

More information

General error locator polynomials for binary cyclic codes with t 2 and n < 63

General error locator polynomials for binary cyclic codes with t 2 and n < 63 General error locator polynomials for binary cyclic codes with t 2 and n < 63 April 22, 2005 Teo Mora (theomora@disi.unige.it) Department of Mathematics, University of Genoa, Italy. Emmanuela Orsini (orsini@posso.dm.unipi.it)

More information

Coding Theory as Pure Mathematics

Coding Theory as Pure Mathematics Coding Theory as Pure Mathematics Steven T. Dougherty July 1, 2013 Origins of Coding Theory How does one communicate electronic information effectively? Namely can one detect and correct errors made in

More information

A Generalization of a result of Catlin: 2-factors in line graphs

A Generalization of a result of Catlin: 2-factors in line graphs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(2) (2018), Pages 164 184 A Generalization of a result of Catlin: 2-factors in line graphs Ronald J. Gould Emory University Atlanta, Georgia U.S.A. rg@mathcs.emory.edu

More information

New Families of Triple Error Correcting Codes with BCH Parameters

New Families of Triple Error Correcting Codes with BCH Parameters New Families of Triple Error Correcting Codes with BCH Parameters arxiv:0803.3553v1 [cs.it] 25 Mar 2008 Carl Bracken School of Mathematical Sciences University College Dublin Ireland May 30, 2018 Abstract

More information

Ch. 2 Math Preliminaries for Lossless Compression. Section 2.4 Coding

Ch. 2 Math Preliminaries for Lossless Compression. Section 2.4 Coding Ch. 2 Math Preliminaries for Lossless Compression Section 2.4 Coding Some General Considerations Definition: An Instantaneous Code maps each symbol into a codeord Notation: a i φ (a i ) Ex. : a 0 For Ex.

More information

Bloom Filters and Locality-Sensitive Hashing

Bloom Filters and Locality-Sensitive Hashing Randomized Algorithms, Summer 2016 Bloom Filters and Locality-Sensitive Hashing Instructor: Thomas Kesselheim and Kurt Mehlhorn 1 Notation Lecture 4 (6 pages) When e talk about the probability of an event,

More information

Elementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q),

Elementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q), Elementary 2-Group Character Codes Cunsheng Ding 1, David Kohel 2, and San Ling Abstract In this correspondence we describe a class of codes over GF (q), where q is a power of an odd prime. These codes

More information

(each row defines a probability distribution). Given n-strings x X n, y Y n we can use the absence of memory in the channel to compute

(each row defines a probability distribution). Given n-strings x X n, y Y n we can use the absence of memory in the channel to compute ENEE 739C: Advanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 6 (draft; 9/6/03. Error exponents for Discrete Memoryless Channels http://www.enee.umd.edu/ abarg/enee739c/course.html

More information

The coset leader and list weight enumerator

The coset leader and list weight enumerator Contemporary Mathematics The coset leader and list weight enumerator Relinde Jurrius and Ruud Pellikaan In Topics in Finite Fields 11th International Conference on Finite Fields and their Applications

More information

IN [1] Kiermaier and Zwanzger construct the extended dualized Kerdock codes ˆK

IN [1] Kiermaier and Zwanzger construct the extended dualized Kerdock codes ˆK New upper bounds on binary linear codes and a Z 4 -code with a better-than-linear Gray image Michael Kiermaier, Alfred Wassermann, and Johannes Zwanzger 1 arxiv:1503.03394v2 [cs.it] 16 Mar 2016 Abstract

More information

Chapter 3 Linear Block Codes

Chapter 3 Linear Block Codes Wireless Information Transmission System Lab. Chapter 3 Linear Block Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Introduction to linear block codes Syndrome and

More information

ON PERTURBATION OF BINARY LINEAR CODES. PANKAJ K. DAS and LALIT K. VASHISHT

ON PERTURBATION OF BINARY LINEAR CODES. PANKAJ K. DAS and LALIT K. VASHISHT Math Appl 4 (2015), 91 99 DOI: 1013164/ma201507 ON PERTURBATION OF BINARY LINEAR CODES PANKAJ K DAS and LALIT K VASHISHT Abstract We present new codes by perturbation of rows of the generating matrix of

More information

Matrix characterization of linear codes with arbitrary Hamming weight hierarchy

Matrix characterization of linear codes with arbitrary Hamming weight hierarchy Linear Algebra and its Applications 412 (2006) 396 407 www.elsevier.com/locate/laa Matrix characterization of linear codes with arbitrary Hamming weight hierarchy G. Viswanath, B. Sundar Rajan Department

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt

More information

On a generalized combinatorial conjecture involving addition mod 2 k 1

On a generalized combinatorial conjecture involving addition mod 2 k 1 On a generalized combinatorial conjecture involving addition mod k 1 Gérard Cohen Jean-Pierre Flori Tuesday 14 th February, 01 Abstract In this note, e give a simple proof of the combinatorial conjecture

More information

MATH/MTHE 406 Homework Assignment 2 due date: October 17, 2016

MATH/MTHE 406 Homework Assignment 2 due date: October 17, 2016 MATH/MTHE 406 Homework Assignment 2 due date: October 17, 2016 Notation: We will use the notations x 1 x 2 x n and also (x 1, x 2,, x n ) to denote a vector x F n where F is a finite field. 1. [20=6+5+9]

More information

On Secret Sharing Schemes, Matroids and Polymatroids

On Secret Sharing Schemes, Matroids and Polymatroids On Secret Sharing Schemes, Matroids and Polymatroids Jaume Martí-Farré, Carles Padró Dep. de Matemàtica Aplicada 4, Universitat Politècnica de Catalunya, Barcelona, Spain {jaumem,cpadro}@ma4.upc.edu June

More information

EE 229B ERROR CONTROL CODING Spring 2005

EE 229B ERROR CONTROL CODING Spring 2005 EE 229B ERROR CONTROL CODING Spring 2005 Solutions for Homework 1 1. Is there room? Prove or disprove : There is a (12,7) binary linear code with d min = 5. If there were a (12,7) binary linear code with

More information

REPRESENTATIONS FOR A SPECIAL SEQUENCE

REPRESENTATIONS FOR A SPECIAL SEQUENCE REPRESENTATIONS FOR A SPECIAL SEQUENCE L. CARLITZ* RICHARD SCOVILLE Dyke University, Durham,!\!orth Carolina VERNERE.HOGGATTJR. San Jose State University, San Jose, California Consider the sequence defined

More information

Correcting Codes in Cryptography

Correcting Codes in Cryptography EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.

More information

MATH32031: Coding Theory Part 15: Summary

MATH32031: Coding Theory Part 15: Summary MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,

More information

Week 3: January 22-26, 2018

Week 3: January 22-26, 2018 EE564/CSE554: Error Correcting Codes Spring 2018 Lecturer: Viveck R. Cadambe Week 3: January 22-26, 2018 Scribe: Yu-Tse Lin Disclaimer: These notes have not been subjected to the usual scrutiny reserved

More information

Orthogonal Arrays & Codes

Orthogonal Arrays & Codes Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible

More information

Chapter 5. Cyclic Codes

Chapter 5. Cyclic Codes Wireless Information Transmission System Lab. Chapter 5 Cyclic Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Description of Cyclic Codes Generator and Parity-Check

More information

On the representability of the bi-uniform matroid

On the representability of the bi-uniform matroid On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 1, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large

More information

MINIMAL CODEWORDS IN LINEAR CODES. Yuri Borissov, Nickolai Manev

MINIMAL CODEWORDS IN LINEAR CODES. Yuri Borissov, Nickolai Manev Serdica Math. J. 30 (2004, 303 324 MINIMAL CODEWORDS IN LINEAR CODES Yuri Borissov, Nickolai Manev Communicated by V. Brînzănescu Abstract. Cyclic binary codes C of block length n = 2 m 1 and generator

More information

Codes over Subfields. Chapter Basics

Codes over Subfields. Chapter Basics Chapter 7 Codes over Subfields In Chapter 6 we looked at various general methods for constructing new codes from old codes. Here we concentrate on two more specialized techniques that result from writing

More information

Error Correcting Index Codes and Matroids

Error Correcting Index Codes and Matroids Error Correcting Index Codes and Matroids Anoop Thomas and B Sundar Rajan Dept of ECE, IISc, Bangalore 5612, India, Email: {anoopt,bsrajan}@eceiiscernetin arxiv:15156v1 [csit 21 Jan 215 Abstract The connection

More information

LIFTED CODES OVER FINITE CHAIN RINGS

LIFTED CODES OVER FINITE CHAIN RINGS Math. J. Okayama Univ. 53 (2011), 39 53 LIFTED CODES OVER FINITE CHAIN RINGS Steven T. Dougherty, Hongwei Liu and Young Ho Park Abstract. In this paper, we study lifted codes over finite chain rings. We

More information

THE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES. Changwoo Lee. 1. Introduction

THE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES. Changwoo Lee. 1. Introduction Commun. Korean Math. Soc. 18 (2003), No. 1, pp. 181 192 THE NUMBER OF INDEPENDENT DOMINATING SETS OF LABELED TREES Changwoo Lee Abstract. We count the numbers of independent dominating sets of rooted labeled

More information

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008 COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture # 12 Scribe: Indraneel Mukherjee March 12, 2008 In the previous lecture, e ere introduced to the SVM algorithm and its basic motivation

More information

Vector spaces. EE 387, Notes 8, Handout #12

Vector spaces. EE 387, Notes 8, Handout #12 Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is

More information

Binary codes from rectangular lattice graphs and permutation decoding

Binary codes from rectangular lattice graphs and permutation decoding Binary codes from rectangular lattice graphs and permutation decoding J. D. Key a,,1 P. Seneviratne a a Department of Mathematical Sciences, Clemson University, Clemson SC 29634, U.S.A. Abstract We examine

More information

A Relation Between Weight Enumerating Function and Number of Full Rank Sub-matrices

A Relation Between Weight Enumerating Function and Number of Full Rank Sub-matrices A Relation Between Weight Enumerating Function and Number of Full Ran Sub-matrices Mahesh Babu Vaddi and B Sundar Rajan Department of Electrical Communication Engineering, Indian Institute of Science,

More information

Secret-sharing with a class of ternary codes

Secret-sharing with a class of ternary codes Theoretical Computer Science 246 (2000) 285 298 www.elsevier.com/locate/tcs Note Secret-sharing with a class of ternary codes Cunsheng Ding a, David R Kohel b, San Ling c; a Department of Computer Science,

More information

SQUARES AND DIFFERENCE SETS IN FINITE FIELDS

SQUARES AND DIFFERENCE SETS IN FINITE FIELDS SQUARES AND DIFFERENCE SETS IN FINITE FIELDS C. Bachoc 1 Univ Bordeaux, Institut de Mathématiques de Bordeaux, 351, cours de la Libération 33405, Talence cedex, France bachoc@math.u-bordeaux1.fr M. Matolcsi

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes

Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Nuh Aydin and Tsvetan Asamov Department of Mathematics Kenyon College Gambier, OH 43022 {aydinn,asamovt}@kenyon.edu

More information

TUTTE POLYNOMIALS OF GENERALIZED PARALLEL CONNECTIONS

TUTTE POLYNOMIALS OF GENERALIZED PARALLEL CONNECTIONS TUTTE POLYNOMIALS OF GENERALIZED PARALLEL CONNECTIONS JOSEPH E. BONIN AND ANNA DE MIER ABSTRACT. We use weighted characteristic polynomials to compute Tutte polynomials of generalized parallel connections

More information

Construction of a (64, 2 37, 12) Code via Galois Rings

Construction of a (64, 2 37, 12) Code via Galois Rings Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T

More information

arxiv: v2 [math.co] 17 May 2017

arxiv: v2 [math.co] 17 May 2017 New nonbinary code bounds based on divisibility arguments Sven Polak 1 arxiv:1606.05144v [math.co] 17 May 017 Abstract. For q, n, d N, let A q (n, d) be the maximum size of a code C [q] n with minimum

More information

Newton, Fermat, and Exactly Realizable Sequences

Newton, Fermat, and Exactly Realizable Sequences 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 8 (2005), Article 05.1.2 Newton, Fermat, and Exactly Realizable Sequences Bau-Sen Du Institute of Mathematics Academia Sinica Taipei 115 TAIWAN mabsdu@sinica.edu.tw

More information

A classification of MDS binary systematic codes

A classification of MDS binary systematic codes A classification of MDS binary systematic codes Eleonora Guerrini (guerrini@science.unitn.it) Department of Mathematics, University of Trento, Italy. Massimiliano Sala (msala@bcri.ucc.ie) Boole Centre

More information

The generalized order-k Fibonacci Pell sequence by matrix methods

The generalized order-k Fibonacci Pell sequence by matrix methods Journal of Computational and Applied Mathematics 09 (007) 33 45 wwwelseviercom/locate/cam The generalized order- Fibonacci Pell sequence by matrix methods Emrah Kilic Mathematics Department, TOBB University

More information

Math 512 Syllabus Spring 2017, LIU Post

Math 512 Syllabus Spring 2017, LIU Post Week Class Date Material Math 512 Syllabus Spring 2017, LIU Post 1 1/23 ISBN, error-detecting codes HW: Exercises 1.1, 1.3, 1.5, 1.8, 1.14, 1.15 If x, y satisfy ISBN-10 check, then so does x + y. 2 1/30

More information

On Linear Subspace Codes Closed under Intersection

On Linear Subspace Codes Closed under Intersection On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F

More information

Constructions of Quadratic Bent Functions in Polynomial Forms

Constructions of Quadratic Bent Functions in Polynomial Forms 1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence

More information

Estimates of the Distance Distribution of Codes and Designs

Estimates of the Distance Distribution of Codes and Designs 1050 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 Estimates of the Distance Distribution of Codes Designs Alexei Ashikhmin, Member, IEEE, Alexer Barg, Senior Member, IEEE, Simon

More information

FRACTIONAL PACKING OF T-JOINS. 1. Introduction

FRACTIONAL PACKING OF T-JOINS. 1. Introduction FRACTIONAL PACKING OF T-JOINS FRANCISCO BARAHONA Abstract Given a graph with nonnegative capacities on its edges, it is well known that the capacity of a minimum T -cut is equal to the value of a maximum

More information

Neighborly families of boxes and bipartite coverings

Neighborly families of boxes and bipartite coverings Neighborly families of boxes and bipartite coverings Noga Alon Dedicated to Professor Paul Erdős on the occasion of his 80 th birthday Abstract A bipartite covering of order k of the complete graph K n

More information

MATH 291T CODING THEORY

MATH 291T CODING THEORY California State University, Fresno MATH 291T CODING THEORY Fall 2011 Instructor : Stefaan Delcroix Contents 1 Introduction to Error-Correcting Codes 3 2 Basic Concepts and Properties 6 2.1 Definitions....................................

More information

Pisano period codes. Ministry of Education, Anhui University No. 3 Feixi Road, Hefei Anhui Province , P. R. China;

Pisano period codes. Ministry of Education, Anhui University No. 3 Feixi Road, Hefei Anhui Province , P. R. China; Pisano period codes Minjia Shi 1,2,3, Zhongyi Zhang 4, and Patrick Solé 5 1 Key Laboratory of Intelligent Computing & Signal Processing, arxiv:1709.04582v1 [cs.it] 14 Sep 2017 Ministry of Education, Anhui

More information

3 - Vector Spaces Definition vector space linear space u, v,

3 - Vector Spaces Definition vector space linear space u, v, 3 - Vector Spaces Vectors in R and R 3 are essentially matrices. They can be vieed either as column vectors (matrices of size and 3, respectively) or ro vectors ( and 3 matrices). The addition and scalar

More information

Which Codes Have 4-Cycle-Free Tanner Graphs?

Which Codes Have 4-Cycle-Free Tanner Graphs? Which Codes Have 4-Cycle-Free Tanner Graphs? Thomas R. Halford Communication Sciences Institute University of Southern California Los Angeles, CA 90089-565 USA Alex J. Grant Institute for Telecommunications

More information

Linear models: the perceptron and closest centroid algorithms. D = {(x i,y i )} n i=1. x i 2 R d 9/3/13. Preliminaries. Chapter 1, 7.

Linear models: the perceptron and closest centroid algorithms. D = {(x i,y i )} n i=1. x i 2 R d 9/3/13. Preliminaries. Chapter 1, 7. Preliminaries Linear models: the perceptron and closest centroid algorithms Chapter 1, 7 Definition: The Euclidean dot product beteen to vectors is the expression d T x = i x i The dot product is also

More information

Formally self-dual additive codes over F 4

Formally self-dual additive codes over F 4 Formally self-dual additive codes over F Sunghyu Han School of Liberal Arts, Korea University of Technology and Education, Cheonan 0-708, South Korea Jon-Lark Kim Department of Mathematics, University

More information

Graphs with prescribed star complement for the. eigenvalue.

Graphs with prescribed star complement for the. eigenvalue. Graphs with prescribed star complement for the eigenvalue 1 F. Ramezani b,a B. Tayfeh-Rezaie a,1 a School of Mathematics, IPM (Institute for studies in theoretical Physics and Mathematics), P.O. Box 19395-5746,

More information

Cover Page. The handle holds various files of this Leiden University dissertation

Cover Page. The handle   holds various files of this Leiden University dissertation Cover Page The handle http://hdl.handle.net/1887/57796 holds various files of this Leiden University dissertation Author: Mirandola, Diego Title: On products of linear error correcting codes Date: 2017-12-06

More information

Bounds for binary codes with narrow distance distributions

Bounds for binary codes with narrow distance distributions Bounds for binary codes with narrow distance distributions Ron M Roth, Gadiel Seroussi Advanced Studies HP Laboratories Palo Alto HPL-006-136 September 9, 006* constant-weight codes, distance distribution,

More information

11 Minimal Distance and the Parity Check Matrix

11 Minimal Distance and the Parity Check Matrix MATH32031: Coding Theory Part 12: Hamming Codes 11 Minimal Distance and the Parity Check Matrix Theorem 23 (Distance Theorem for Linear Codes) Let C be an [n, k] F q -code with parity check matrix H. Then

More information

Permutation groups/1. 1 Automorphism groups, permutation groups, abstract

Permutation groups/1. 1 Automorphism groups, permutation groups, abstract Permutation groups Whatever you have to do with a structure-endowed entity Σ try to determine its group of automorphisms... You can expect to gain a deep insight into the constitution of Σ in this way.

More information

A Characterization of (3+1)-Free Posets

A Characterization of (3+1)-Free Posets Journal of Combinatorial Theory, Series A 93, 231241 (2001) doi:10.1006jcta.2000.3075, available online at http:www.idealibrary.com on A Characterization of (3+1)-Free Posets Mark Skandera Department of

More information

Algebraic Methods in Combinatorics

Algebraic Methods in Combinatorics Algebraic Methods in Combinatorics Po-Shen Loh 27 June 2008 1 Warm-up 1. (A result of Bourbaki on finite geometries, from Răzvan) Let X be a finite set, and let F be a family of distinct proper subsets

More information

An Extremal Doubly Even Self-Dual Code of Length 112

An Extremal Doubly Even Self-Dual Code of Length 112 An Extremal Doubly Even Self-Dual Code of Length 112 Masaaki Harada Department of Mathematical Sciences Yamagata University Yamagata 990 8560, Japan mharada@sci.kj.yamagata-u.ac.jp Submitted: Dec 29, 2007;

More information

Vector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition)

Vector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition) Vector Space Basics (Remark: these notes are highly formal and may be a useful reference to some students however I am also posting Ray Heitmann's notes to Canvas for students interested in a direct computational

More information

Codes and Rings: Theory and Practice

Codes and Rings: Theory and Practice Codes and Rings: Theory and Practice Patrick Solé CNRS/LAGA Paris, France, January 2017 Geometry of codes : the music of spheres R = a finite ring with identity. A linear code of length n over a ring R

More information

Statistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study

Statistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study International Journal of Foundations of Computer Science c World Scientific Publishing Company Statistical Properties of the Arithmetic Correlation of Sequences Mark Goresky School of Mathematics Institute

More information

ELEMENTARY SUBALGEBRAS OF RESTRICTED LIE ALGEBRAS

ELEMENTARY SUBALGEBRAS OF RESTRICTED LIE ALGEBRAS ELEMENTARY SUBALGEBRAS OF RESTRICTED LIE ALGEBRAS J. WARNER SUMMARY OF A PAPER BY J. CARLSON, E. FRIEDLANDER, AND J. PEVTSOVA, AND FURTHER OBSERVATIONS 1. The Nullcone and Restricted Nullcone We will need

More information

On the Correlation Distribution of Delsarte Goethals Sequences

On the Correlation Distribution of Delsarte Goethals Sequences On the Correlation Distribution of Delsarte Goethals Seuences Kai-Uwe Schmidt 9 July 009 (revised 01 December 009) Abstract For odd integer m 3 and t = 0, 1,..., m 1, we define Family V (t) to be a set

More information

The Binary Self-Dual Codes of Length Up To 32: A Revised Enumeration*

The Binary Self-Dual Codes of Length Up To 32: A Revised Enumeration* The Binary Self-Dual Codes of Length Up To 32: A Revised Enumeration* J. H. Conway Mathematics Department Princeton University Princeton, New Jersey 08540 V. Pless** Mathematics Department University of

More information

Extending MDS Codes. T. L. Alderson

Extending MDS Codes. T. L. Alderson Extending MDS Codes T. L. Alderson Abstract A q-ary (n,k)-mds code, linear or not, satisfies n q + k 1. A code meeting this bound is said to have maximum length. Using purely combinatorial methods we show

More information

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes ELEC 519A Selected Topics in Digital Communications: Information Theory Hamming Codes and Bounds on Codes Single Error Correcting Codes 2 Hamming Codes (7,4,3) Hamming code 1 0 0 0 0 1 1 0 1 0 0 1 0 1

More information