Some New Optimal Ternary Linear Codes
|
|
- Jemima Malone
- 5 years ago
- Views:
Transcription
1 Designs, Codes and Cryptography, 12, 5 11 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Some New Optimal Ternary Linear Codes ILIYA BOUKLIEV* Institute of Mathematics, Bulgarian Academy of Sciences, P.O.Box 323, 5000 V. Tarnovo, Bulgaria Communicated by: H. van Tilborg Received February 23, 1996; Revised August 1, 1996; Accepted September 9, 1996 Abstract. Let d 3 (n, k) be the maximum possible minimum Hamming distance of a ternary [n, k, d; 3]-code for given values of n and k. It is proved that d 3 (44, 6) = 27, d 3 (76, 6) = 48, d 3 (94, 6) = 60, d 3 (124, 6) = 81, d 3 (130, 6) = 84, d 3 (134, 6) = 87, d 3 (138, 6) = 90, d 3 (148, 6) = 96, d 3 (152, 6) = 99, d 3 (156, 6) = 102, d 3 (164, 6) = 108, d 3 (170, 6) = 111, d 3 (179, 6) = 117, d 3 (188, 6) = 123, d 3 (206, 6) = 135, d 3 (211, 6) = 138, d 3 (224, 6) = 147, d 3 (228, 6) = 150, d 3 (236, 6) = 156, d 3 (31, 7) = 17 and d 3 (33, 7) = 18. These results are obtained by a descent method for designing good linear codes. Keywords: ternary codes, optimal codes, construction method 1. Introduction Let Fq n be the n-dimensional vector space over the Galois field F q. The Hamming distance between two vectors of Fq n is defined to be the number of coordinates in which they differ. A q-ary linear [n, k, d; q]-code is a k-dimensional linear subspace of Fq n with minimum distance d. A central problem in coding theory is to optimize one of the parameters n, k, d for given values of the other two. Two versions are: Problem 1. Find d q (n, k), the largest value of d for which there exists an [n, k, d; q]-code. Problem 2. Find n q (k, d), the smallest value of n for which there exists an [n, k, d; q]-code. A code which achieves one of these two values is called optimal. Problem 2 for the case of ternary (q = 3) codes has been considered by Hill and Newton [26]. The problem of finding n 3 (k, d) was solved for k 4 for all d, and values of n 3 (5, d) were determined for all but 30 values of d. The works of van Eupen [6], [4], van Eupen and Hill [8], van Eupen, Hamada and Watamori [7], Hamada and Watamori [21], Hamada, Helleseth and Ytrehus [20], Bogdanova and Boukliev [1], and Landgev [14] solve the problem of finding n 3 (k, d) for k = 5 for all d. The problem of finding n 3 (6, d) has been studied by many authors. Results have been obtained by Brouwer and van Eupen [2], Daskalov [3], van Eupen [6], [5], Gulliver [10], * This work was partially supported by the Bulgarian National Science Fund under Grant No. MM - 502/1995. This work was presented in part at the International Workshop OCRT 95, Sozopol, Bulgaria, May 26 June 1, 1995 and at the IEEE International Simposium on Information Theory, Whistler, Canada, September 17 22, 1995.
2 6 BOUKLIEV Gulliver and Bhargava [11], [12], Kschischang and Pasupathy [13], Hamada [15], [16], Hamada and Helleseth [17], [18], [19], Hamada and Watamori [22], Hill [24] and Hill and Greenough [25]. This paper considers ternary codes. In Section 2 a method for construction of good linear codes is presented. Section 3 includes the new results. 2. Construction Method Let S k,q be the set of all column vectors a = (a 1, a 2,...,a k ) t Fq k such that either a 1 = 1 or a 1 = a 2 = =a i 1 = 0, a i = 1 for some integer i in {2, 3,...,k}, where k 3 and Fq k denotes a k-dimensional vector space over F q. Then S k,q consists of all (q k 1)/(q 1) nonzero vectors in Fq k and the vectors in S k,q can be regarded as (q k 1)/(q 1) points in a finite projective geometry PG(k 1,q). A linear code is called projective if no two columns of a generator matrix are linearly dependent. We regard the columns of the generator matrix of a projective code as a subset of S k,q.for any n-element subset of S k,q there is a projective [n, k 0, d; q]-code, k 0 k with a generator matrix containing these elements as columns. Denote by T (C) the set of the columns of the generator matrix of the code C, considered as elements of S k,q. The Griesmer bound [9], [28] provides an important lower bound on n q (k, d): k 1 n q (k, d) g q (k, d) = d/q i. i=0 LEMMA 1 ([23]) Suppose that d q k 1 andthatcisan[n,k,d;q]-code which attains the Griesmer bound. Then C is projective. The problem of the construction of a [g q (k, d), k, d; q] code (if such a code exists) can be formulated in the following way: Find n elements of S k,q such that the [n, k, d; q] code meets the Griesmer bound. We use the following notations: 1. Each n-element subset of S k,q is called a solution. 2. The substitution of a given element of a solution s by another one is called an elementary transformation. 3. The neighbourhood N(s) of a solution s is the set of all solutions s that can be obtained from s by an elementary transformation. 4. We define the evaluation function by f (s) = d min (s)q k + q k A dmin (s), where d min (s) is the minimum distance of the corresponding code and A dmin (s) is the number of codewords of minimum weight in the corresponding code.
3 SOME NEW OPTIMAL TERNARY LINEAR CODES 7 The problem of the construction of a [g q (k, d), k, d; q] code (if such one exists) if considered as a combinatorial optimization problem is the following max{ f (s), s S k,q, s =n}. The construction method is based on the next heuristic algorithm: variables s, s : solution; Number of Descents:integer; begin Number of Descents:=Random(1000); while Number of Descents>0 do begin {descent } Get Initial Solution (s); while exists s in N(s) such that f(s ) > f(s) do s:=s ; if d min (s) = d target then Output Solution (s); Number of Descents:=Number of Descents 1; end; {descent } end. The initial solution s can be chosen in several ways: (i) By using a code C with parameters [n l, k, d δ; q] where δ l. In this case l elements from S k,q, not belonging to T (C ) are randomly added to T (C ). (ii) By using a code C with parameters [n + l, k, d + l 1; q]. In this case l elements of T (C ) are randomly deleted. This algorithm can be used for constructing optimal codes not meeting the Griesmer bound. If d > q k 1 the set S k,q must be taken several times. For all codes constructed in the paper by this method the set S k,q is taken twice. Some examples are given in the next table: Initial Solution Result [120, 6, 78; 3] [124, 6, 81; 3] [124, 6, 81; 3] [130, 6, 84; 3] [160, 6, 105; 3] [156, 6, 102; 3] [156, 6, 102; 3] [152, 6, 99; 3] Other versions of the descent method are used in [11], [27]. 3. The New Results The results in dimension 6 are summarized in Theorem 1.
4 8 BOUKLIEV THEOREM 1 There exist codes with parameters (i) [44, 6, 27; 3], [76, 6, 48; 3], [94, 6, 60; 3], [124, 6, 81; 3], [130, 6, 84; 3], [134, 6, 87; 3], [138, 6, 90; 3], [148, 6, 96; 3], [152, 6, 99; 3], [156, 6, 102; 3], [164, 6, 108; 3], [170, 6, 111; 3], [179, 6, 117; 3], [188, 6, 123; 3],[206, 6, 135; 3] [211, 6, 138; 3], [224, 6, 147; 3], and [236, 6, 156; 3]; (ii) [228, 6, 150; 3]. Proof. (i) Codes with such parameters are constructed by the method from Section 2. Theirweight enumerators are: [44, 6, 27; 3] z z z z 36, [76, 6, 48; 3] z z z z 57, [94, 6, 60; 3] z z z z 72, [124, 6, 81; 3] z z z 99, [130, 6, 84; 3] z z z z z z z 105, [134, 6, 87; 3] z z z z z 105, [138, 6, 90; 3] z z z z 117, [148, 6, 96; 3] z z z z z 114, [152, 6, 99; 3] z z z z z 117, [156, 6, 102; 3] z z z z z 120, [164, 6, 108; 3] z z z 126, [170, 6, 111; 3] z z z z z z z 132, [179, 6, 117; 3] z z z z z z z z 141, [188, 6, 123; 3] z z z z z 141, [206, 6, 135; 3] z z z 153, [211, 6, 138; 3] z z z z z 162, [224, 6, 147; 3] z z z z 171 [236, 6, 156; 3] z z z z 183. The description of the corresponding generator matrices is given in Appendix. (ii) This code has been constructed as a quasi-twisted one with a generator matrix consisting of 38 twistulant matrices with first rows , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , The weight enumerator of the code is z z z z 174. For quasi-twisted codes see [25]. All codes described above are optimal with respect to minimum distance (See [22]). THEOREM 2 d 3 (31, 7) = 17 and d 3 (33, 7) = 18. Proof. From [22] we have d 3 (31, 7) 17 and d 3 (33, 7) 18.
5 SOME NEW OPTIMAL TERNARY LINEAR CODES 9 Codes with parameters [31, 7, 17; 3] and [33, 7, 18; 3] were constructed by the method from Section 2. Their weight enumerators and generator matrices are [31, 7, 17; 3] 1+324z z z z z z z z z 25 +2z 27, [33, 7, 18; 3] 1+348z z z z z z z z z z 27, Appendix. Generator Matrices of Codes from Theorem 1 Let the vectors from S k,q be arranged in lexicographic order. A generator matrix of a projective code is represented by a binary vector of length (q k 1)/(q 1) with 1 indicating the presence, and 0 the absence of a vector of S k,q. This binary vector is then broken into blocks of length 4, each of which is represented by a hexadecimal symbol from {0, 1,...,9,a,b,c,d,e, f}. If it is necessary the last block is beforehand completed by zeroes. Example. if q = 3 and k = 3 the set S k,q looks like that: Then the code [8,3,4;3] with generator matrix:
6 10 BOUKLIEV is represented in the following way: (2) = e1d8 (16). [44, 6, 27; 3] c a a a008; [76, 6, 48; 3] 1420a c80c bc c00100; [94, 6, 60; 3] d200842d b84c451e e310 03a ; [124, 6, 81; 3] 1660b c c28342d1089dec0132d20c f213c c025e011 0d002133a19; [129, 6, 83; 3] 1662b c c29342d1589dec0132d20c c0906f213c e011 0d002133a19; [134, 6, 87; 3] 1661b c d039c29342d1589dec0932d20c c0906f213c c025e011 0d002133a19; [138, 6, 90; 3] e044040c0131bdea210f0dc bead20051c8cac7e1736bfd4c47018a03108be aa551005; [148, 6, 96; 3] dead645c41e21901a06a2be29d29216b ae100b1a39a24a98dc560450b34a a8a5 710ad281951; [152, 6, 99; 3] b5b2c052d9d b06672d02da52722b95b05114e8a d369144b26a281f80b b2222b94; [156, 6, 102; 3] b5b2c0d2d9d b06672d02da52722b95b05114e8a d369144b26a281f82b b2222b95; [164, 6, 108; 3] b5b2c0d2d9d c2b06672d02da52722b95b05134e8e d369144b26a283f82b b2223b95; [170, 6, 111; 3] c356044b3608e7ea401fdc68fc220b81aec773b b646f90976b1f70bcd16826efb ad2248d2bd8; [178, 6, 116; 3] 02dfe85c357684b364ae7ea401f9c68ec220a018ec773b b646f90976b1f709cd16826efb ad2268d2bdc; [188, 6, 123; 3] 23c00946aaa542cf23c2917cf5671ea541c19e721db71faf34805eee30b5db22c73add2d373acb4d d6bbad7cc47; [206, 6, 135; 3] 35f8e77d3d485b5bde09ffab016fe33ed74d9c3c761a2f13caffd5024f437df4dfe5141f96d26fbb 54f65f18121; [210, 6, 137; 3] 29d1265f7c4335e369467dae2dedf1ae49c7b9f8b1ee8e1b36d36c96b5861beefb60f6dde597e7f4 d1b6bfae12d; [224, 6, 147; 3] fba476f5c3cd0be3bced71eeead37a785ea734de5ed9ca37e7adacedd7ca3f6b6add57b1ddd71cee f8728fad3d3; [12, 6, 6; 3] the extended ternary Golay code, a0000; The generator matrices of the [130,6,84;3], [179,6,117;3] and [211,6,138;3] codes are obtained by adding the vectors (0,1,0,1,2,2) t, (0,1,0,0,0,1) t and (1,2,1,2,1,2) t respectively to the generator matrices of the [129,6,83;3], [178,6,116;3] and [210,6,137;3] codes. We obtain a generator matrix of a non-projective [236,6,156;3] code concatenating the generator matrices of the [12,6,6;3] and [224,6,147;3] codes given above. Acknowledgments The author thanks Prof. S. Dodunekov, Prof. S. Kapralov and Dr. R. Daskalov for their helpful remarks.
7 SOME NEW OPTIMAL TERNARY LINEAR CODES 11 References 1. G. Bogdanova and I. Boukliev, New linear codes of dimension 5 over GF(3), Proc. Inter. Workshop ACCT-94, Novgorod, Russia (1994) pp A. E. Brouwer and M. van Eupen, The correspondence between projective codes and 2-weight codes, Designs, Codes and Cryptography (to appear). 3. R. N. Daskalov, Bounds for binary and ternary linear codes, Ph.D. Thesis (1993). 4. M. van Eupen, Five new optimal ternary linear codes, IEEE Trans. Info. Theory, Vol. 40 (1994) p M. van Eupen, Four non-existence results for ternary linear codes, IEEE Trans. Inform. Theory, Vol. 41 (1995) pp M. van Eupen, Some new results for ternary linear codes of dimension 5 and 6, IEEE Trans. Inform. Theory, Vol. 41, No. 6 (1995) pp M. van Eupen, N. Hamada and Y. Watamori, The nonexistence of ternary [50, 5, 32] codes, Designs, Codes and Cryptography, Vol. 7, No. 3 (1996) pp M. van Eupen and R. Hill, An optimal termary [69, 5, 45] code and related codes, Designs, Codes and Cryptography, Vol. 4, No. 3 (1994) pp J. H. Griesmer, A bound for error-correcting codes, IBM J. Res. Devel., Vol. 4 (1960) pp T. A. Gulliver, New optimal ternary linear codes, IEEE Trans. Inform. Theory, Vol. 41 (1995) pp T. A. Gulliver and V. K. Bhargava, Some best rate 1/p and rate (p 1)/p systematic quasi-cyclic codes over GF(3) and GF(4), IEEE Trans. Inform. Theory, Vol. 38 (1992) pp T. A. Gulliver and V. K. Bhargava, New good rate (m 1)/pm ternary and quaternary quasi-cyclic codes, Designs, Codes and Cryptography (to appear). 13. F. R. Kschischang and S. Pasupathy, Some ternary and quaternary codes and associated sphere packings, IEEE Trans. Inform. Theory, Vol. 38 (1992) pp I. Landgev, Nonexistence of [143, 5, 94] 3 Codes, Proc. Inter. Workshop OCRT 95, Sozopol, Bulgaria (1995) pp N. Hamada, A survey of recent work on characterization of minihypers in PG(t,q) and nonbinary linear codes meeting the Griesmer bound, J. Combin. Inform. Syst. Sci., Vol. 18 (1993) pp N. Hamada, The nonexistence of [303, 6, 201; 3]-codes meeting the Griesmer bound, Technical Report OWUAM-009, Osaka Women s Univ., Sakai, Osaka 590, Japan (1995). 17. N. Hamada and T. Helleseth, The uniqueness of [87, 5, 57; 33]-codes and the nonexistence of [258, 6, 171; 3]-codes, J. Statist. Plann. Inference (to appear). 18. N. Hamada and T. Helleseth, Construction of some optimal ternary codes and the uniqueness of [294, 6, 195; 3]-codes meeting the Griesmer bound, Finite Field and Their Application, Vol. 1 (1995) pp N. Hamada and T. Helleseth, The nonexistence of ternary [270, 6, 179] codes and [309, 6, 205] codes, Proc. Inter. Workshop OCRT 95, Sozopol, Bulgaria (1995) pp N. Hamada, T. Helleseth and Ø. Ytrehus, On the construction of a [q 4 +q 2 q, 5, q 4 q 3 +q 2 2q; q]-code meeting the Griesmer bound, Designs, Codes and Cryptography, Vol. 2 (1992) pp N. Hamada and Y. Watamori, The nonexistence of [71, 5, 46; 3]-codes, J. Statist. Plann. Inference (to appear). 22. N. Hamada and Y. Watamori, The nonexistence of some ternary linear codes of dimension 6 and the bounds for n 3 (6, d), 1 d 243, Math. Japonica, Vol. 43 (1996) pp R. Hill, Optimal Linear Codes: Cryptography and Coding II (C. Mitchell, ed.), Oxford University Press (1992) pp R. Hill, Caps and codes, Discrete Math., Vol. 22 (1978) pp R. Hill and P. P. Greenough, Optimal quasi-twisted codes, Proc. Inter. Workshop ACCT-92, Voneshta voda, Bulgaria (1992) pp R. Hill and D. E. Newton, Optimal ternary linear codes, Designs, Codes and Cryptography, Vol. 2, No. 2 (1992) pp A. Said and R. Palazzo, Heuristic search: A new method to design good unit memory convolutional codes, Proc. Fourth Swedish-Soviet Inter. Workshop on Inf. Theory, Gotland, Sweden (1989) pp G. Solomon and J. J. Stiffler, Algebraically punctured cyclic codes, Inform. and Control., Vol. 8 (1965) pp
The Structure of 1-Generator Quasi-Twisted Codes and New Linear Codes
C Designs, Codes and Cryptography, 24, 313 326, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. The Structure of 1-Generator Quasi-Twisted Codes and New Linear Codes NUH AYDIN Department
More informationOn the properness of some optimal binary linear codes and their dual codes
Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 76-81 On the properness of some optimal binary linear codes and their dual codes Rossitza
More informationNecklaces: Generalizations
Necklaces: Generalizations V Ch Venkaiah V Ch Venkaiah is presently with the School of Computer and Information Sciences, University of Hyderabad. Prior to that he served in several organizations including
More informationMatrix characterization of linear codes with arbitrary Hamming weight hierarchy
Linear Algebra and its Applications 412 (2006) 396 407 www.elsevier.com/locate/laa Matrix characterization of linear codes with arbitrary Hamming weight hierarchy G. Viswanath, B. Sundar Rajan Department
More informationOn non-antipodal binary completely regular codes
On non-antipodal binary completely regular codes J. Borges, J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, 08193-Bellaterra, Spain. V.A. Zinoviev Institute
More informationSome codes related to BCH-codes of low dimension
Discrete Mathematics 205 (1999) 57 64 www.elsevier.com/locate/disc Some codes related to BCH-codes of low dimension Yves Edel a,jurgen Bierbrauer b; a Mathematisches Institut der Universitat, Im Neuenheimer
More informationSolutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16
Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the
More informationEnumeration of Generalized Necklaces over F q
Enumeration of Generalized Necklaces over F q by Jumah Ali Algallaf B.Sc., King Fahd University of Petroleum and Minerals, Saudi Arabia, 2006 A Project Report Submitted in Partial Fulfillment of the Requirements
More informationInternational Mathematical Forum, Vol. 6, 2011, no. 4, Manjusri Basu
International Mathematical Forum, Vol 6, 011, no 4, 185-191 Square Designs on New Binary ( 3n 1, 3 n ) Codes Manjusri Basu Department of Mathematics University of Kalyani Kalyani, WB, India, Pin-74135
More informationSome Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes
Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Nuh Aydin and Tsvetan Asamov Department of Mathematics Kenyon College Gambier, OH 43022 {aydinn,asamovt}@kenyon.edu
More informationExtended Binary Linear Codes from Legendre Sequences
Extended Binary Linear Codes from Legendre Sequences T. Aaron Gulliver and Matthew G. Parker Abstract A construction based on Legendre sequences is presented for a doubly-extended binary linear code of
More informationIN [1] Kiermaier and Zwanzger construct the extended dualized Kerdock codes ˆK
New upper bounds on binary linear codes and a Z 4 -code with a better-than-linear Gray image Michael Kiermaier, Alfred Wassermann, and Johannes Zwanzger 1 arxiv:1503.03394v2 [cs.it] 16 Mar 2016 Abstract
More informationThe Binary Self-Dual Codes of Length Up To 32: A Revised Enumeration*
The Binary Self-Dual Codes of Length Up To 32: A Revised Enumeration* J. H. Conway Mathematics Department Princeton University Princeton, New Jersey 08540 V. Pless** Mathematics Department University of
More informationWe saw in the last chapter that the linear Hamming codes are nontrivial perfect codes.
Chapter 5 Golay Codes Lecture 16, March 10, 2011 We saw in the last chapter that the linear Hamming codes are nontrivial perfect codes. Question. Are there any other nontrivial perfect codes? Answer. Yes,
More informationOn the Griesmer bound for nonlinear codes
On the Griesmer bound for nonlinear codes Emanuele Bellini, Alessio Meneghetti To cite this version: Emanuele Bellini, Alessio Meneghetti. On the Griesmer bound for nonlinear codes. Pascale Charpin, Nicolas
More informationSymmetric configurations for bipartite-graph codes
Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 63-69 Symmetric configurations for bipartite-graph codes Alexander Davydov adav@iitp.ru
More informationNEW BINARY EXTREMAL SELF-DUAL CODES OF LENGTHS 50 AND 52. Stefka Buyuklieva
Serdica Math. J. 25 (1999), 185-190 NEW BINARY EXTREMAL SELF-DUAL CODES OF LENGTHS 50 AND 52 Stefka Buyuklieva Communicated by R. Hill Abstract. New extremal binary self-dual codes of lengths 50 and 52
More informationA Note on Non-Existence of (8,4)-2 Burst Error Correcting Code
Applied Mathematical Sciences, Vol. 4, 2010, no. 44, 2201-2205 A Note on Non-Existence of (8,4)-2 Burst Error Correcting Code Navneet Singh Rana Research Scholar, Department of Mathematics University of
More informationGalois geometries contributing to coding theory
Ghent University Dept. of Pure Mathematics and Computer Algebra Krijgslaan 281 - S22 9000 Ghent Belgium Thurnau, April 15, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 EXTENDABILITY RESULTS
More informationSecret Sharing Schemes from a Class of Linear Codes over Finite Chain Ring
Journal of Computational Information Systems 9: 7 (2013) 2777 2784 Available at http://www.jofcis.com Secret Sharing Schemes from a Class of Linear Codes over Finite Chain Ring Jianzhang CHEN, Yuanyuan
More information7.1 Definitions and Generator Polynomials
Chapter 7 Cyclic Codes Lecture 21, March 29, 2011 7.1 Definitions and Generator Polynomials Cyclic codes are an important class of linear codes for which the encoding and decoding can be efficiently implemented
More informationPlotkin s Bound in Codes Equipped with the Euclidean Weight Function
Tamsui Oxford Journal of Mathematical Sciences 5() (009) 07-4 Aletheia University Plotkin s Bound in Codes Equipped with the Euclidean Weight Function Sapna Jain Department of Mathematics, University of
More informationELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes
ELEC 519A Selected Topics in Digital Communications: Information Theory Hamming Codes and Bounds on Codes Single Error Correcting Codes 2 Hamming Codes (7,4,3) Hamming code 1 0 0 0 0 1 1 0 1 0 0 1 0 1
More informationCONSTRUCTION OF (SOMETIMES) OPTIMAL LINEAR CODES
CONSTRUCTION OF (SOMETIMES) OPTIMAL LINEAR CODES MICHAEL BRAUN, AXEL KOHNERT AND ALFRED WASSERMANN 1. INTRODUCTION For the purpose of error correcting linear codes over a finite field GF (q) and fixed
More informationGalois geometries contributing to coding theory
Ghent University Dept. of Mathematics Krijgslaan 281 - S22 9000 Ghent Belgium Opatija, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 COVERING RADIUS AND SATURATING SETS 4 LINEAR MDS CODES
More informationLDPC codes based on Steiner quadruple systems and permutation matrices
Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory September 7 13, 2014, Svetlogorsk (Kaliningrad region), Russia pp. 175 180 LDPC codes based on Steiner quadruple systems and
More informationLow-complexity error correction in LDPC codes with constituent RS codes 1
Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 348-353 Low-complexity error correction in LDPC codes with constituent RS codes 1
More informationON THE STRUCTURE OF (t mod q)-arcs IN FINITE PROJECTIVE GEOMETRIES
GODIXNIK NA SOFI SKI UNIVERSITET SV. KLIMENT OHRIDSKI FAKULTET PO MATEMATIKA I INFORMATIKA Tom 103 ANNUAL OF SOFIA UNIVERSITY ST. KLIMENT OHRIDSKI FACULTY OF MATHEMATICS AND INFORMATICS Volume 103 ON THE
More informationORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES
ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES ANDRIES E. BROUWER, ARJEH M. COHEN, MAN V.M. NGUYEN Abstract. All mixed (or asymmetric) orthogonal arrays of strength 3 with run size at most 64 are
More informationCONSTRUCTION OF QUASI-CYCLIC CODES
CONSTRUCTION OF QUASI-CYCLIC CODES by Thomas Aaron Gulliver B.Sc., 1982 and M.Sc., 1984 University of New Brunswick A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF
More informationOn permutation automorphism groups of q-ary Hamming codes
Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 28, Pamporovo, Bulgaria pp. 119-124 On permutation automorphism groups of q-ary Hamming codes Evgeny V. Gorkunov
More informationNew binary self-dual codes of lengths 50 to 60
Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) New binary self-dual codes of lengths 50 to 60 Nikolay Yankov Moon Ho Lee Received: date / Accepted: date Abstract Using
More informationFRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES
FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES ANDRIES E. BROUWER, ARJEH M. COHEN, MAN V.M. NGUYEN Abstract. All mixed (or asymmetric) orthogonal arrays of strength 3 with run size at most
More informationOn the construction of small (l, t)-blocking sets in PG(2, q)
Sofia, 10-14 July 2017 p. 1 On the construction of small (l, t)-blocking sets in PG(2, q) Rumen Daskalov, Elena Metodieva Department of Mathematics and Informatics Technical University of Gabrovo 5300
More informationG Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.
EE 387 October 28, 2015 Algebraic Error-Control Codes Homework #4 Solutions Handout #24 1. LBC over GF(5). Let G be a nonsystematic generator matrix for a linear block code over GF(5). 2 4 2 2 4 4 G =
More informationThe Witt designs, Golay codes and Mathieu groups
The Witt designs, Golay codes and Mathieu groups 1 The Golay codes Let V be a vector space over F q with fixed basis e 1,..., e n. A code C is a subset of V. A linear code is a subspace of V. The vector
More informationON A TWO-DIMENSIONAL SEARCH PROBLEM. Emil Kolev, Ivan Landgev
Serdica Math. J. 21 (1995), 219-230 ON A TWO-DIMENSIONAL SEARCH PROBLEM Emil Kolev, Ivan Landgev Communicated by R. Hill Abstract. In this article we explore the so-called two-dimensional tree search problem.
More informationConstruction of a (64, 2 37, 12) Code via Galois Rings
Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T
More informationOn the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,
More informationOn q-ary optimal equitable symbol weight codes
On q-ary optimal equitable symbol weight codes 1/20 On q-ary optimal equitable symbol weight codes L. A. Bassalygo, V.A. Zinoviev A.A. Kharkevich Institute for Problems of Information Transmission, Moscow,
More informationThe BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes
S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding
More informationOn the Algebraic Structure of Quasi-Cyclic Codes I: Finite Fields
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 47, NO 7, NOVEMBER 2001 2751 On the Algebraic Structure of Quasi-Cyclic Codes I: Finite Fields San Ling Patrick Solé, Member, IEEE Abstract A new algebraic
More informationSupport weight enumerators and coset weight distributions of isodual codes
Support weight enumerators and coset weight distributions of isodual codes Olgica Milenkovic Department of Electrical and Computer Engineering University of Colorado, Boulder March 31, 2003 Abstract In
More informationPAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES
International Journal of Pure and Applied Mathematics Volume 85 No. 6 013, 1001-1008 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/10.173/ijpam.v85i6.3
More informationMultiple coverings of the farthest-off points and multiple saturating sets in projective spaces
Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory June 15-21, 2012, Pomorie, Bulgaria pp. 53 59 Multiple coverings of the farthest-off points and multiple saturating sets in
More informationThere are no Barker arrays having more than two dimensions
There are no Barker arrays having more than two dimensions Jonathan Jedwab Matthew G. Parker 5 June 2006 (revised 7 December 2006) Abstract Davis, Jedwab and Smith recently proved that there are no 2-dimensional
More informationPermutation decoding for the binary codes from triangular graphs
Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for
More informationVector spaces. EE 387, Notes 8, Handout #12
Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is
More informationChapter 7 Reed Solomon Codes and Binary Transmission
Chapter 7 Reed Solomon Codes and Binary Transmission 7.1 Introduction Reed Solomon codes named after Reed and Solomon [9] following their publication in 1960 have been used together with hard decision
More informationBinary Convolutional Codes of High Rate Øyvind Ytrehus
Binary Convolutional Codes of High Rate Øyvind Ytrehus Abstract The function N(r; ; d free ), defined as the maximum n such that there exists a binary convolutional code of block length n, dimension n
More informationExtending MDS Codes. T. L. Alderson
Extending MDS Codes T. L. Alderson Abstract A q-ary (n,k)-mds code, linear or not, satisfies n q + k 1. A code meeting this bound is said to have maximum length. Using purely combinatorial methods we show
More informationOn Construction of a Class of. Orthogonal Arrays
On Construction of a Class of Orthogonal Arrays arxiv:1210.6923v1 [cs.dm] 25 Oct 2012 by Ankit Pat under the esteemed guidance of Professor Somesh Kumar A Dissertation Submitted for the Partial Fulfillment
More information(Reprint of pp in Proc. 2nd Int. Workshop on Algebraic and Combinatorial coding Theory, Leningrad, Sept , 1990)
(Reprint of pp. 154-159 in Proc. 2nd Int. Workshop on Algebraic and Combinatorial coding Theory, Leningrad, Sept. 16-22, 1990) SYSTEMATICITY AND ROTATIONAL INVARIANCE OF CONVOLUTIONAL CODES OVER RINGS
More information5.0 BCH and Reed-Solomon Codes 5.1 Introduction
5.0 BCH and Reed-Solomon Codes 5.1 Introduction A. Hocquenghem (1959), Codes correcteur d erreurs; Bose and Ray-Chaudhuri (1960), Error Correcting Binary Group Codes; First general family of algebraic
More informationSPHERE PACKINGS CONSTRUCTED FROM BCH AND JUSTESEN CODES
SPHERE PACKINGS CONSTRUCTED FROM BCH AND JUSTESEN CODES N. J. A. SLOANE Abstract. Bose-Chaudhuri-Hocquenghem and Justesen codes are used to pack equa spheres in M-dimensional Euclidean space with density
More informationON PERTURBATION OF BINARY LINEAR CODES. PANKAJ K. DAS and LALIT K. VASHISHT
Math Appl 4 (2015), 91 99 DOI: 1013164/ma201507 ON PERTURBATION OF BINARY LINEAR CODES PANKAJ K DAS and LALIT K VASHISHT Abstract We present new codes by perturbation of rows of the generating matrix of
More informationCLASSICAL error control codes have been designed
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 56, NO 3, MARCH 2010 979 Optimal, Systematic, q-ary Codes Correcting All Asymmetric and Symmetric Errors of Limited Magnitude Noha Elarief and Bella Bose, Fellow,
More informationFinite geometry codes, generalized Hadamard matrices, and Hamada and Assmus conjectures p. 1/2
Finite geometry codes, generalized Hadamard matrices, and Hamada and Assmus conjectures Vladimir D. Tonchev a Department of Mathematical Sciences Michigan Technological University Houghton, Michigan 49931,
More informationOn the Classification of Splitting (v, u c, ) BIBDs
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 5 Special Thematic Issue on Optimal Codes and Related Topics Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081
More informationAdvanced Engineering Mathematics Prof. Pratima Panigrahi Department of Mathematics Indian Institute of Technology, Kharagpur
Advanced Engineering Mathematics Prof. Pratima Panigrahi Department of Mathematics Indian Institute of Technology, Kharagpur Lecture No. # 02 Vector Spaces, Subspaces, linearly Dependent/Independent of
More informationType I Codes over GF(4)
Type I Codes over GF(4) Hyun Kwang Kim San 31, Hyoja Dong Department of Mathematics Pohang University of Science and Technology Pohang, 790-784, Korea e-mail: hkkim@postech.ac.kr Dae Kyu Kim School of
More informationAn Analytic Approach to the Problem of Matroid Representibility: Summer REU 2015
An Analytic Approach to the Problem of Matroid Representibility: Summer REU 2015 D. Capodilupo 1, S. Freedman 1, M. Hua 1, and J. Sun 1 1 Department of Mathematics, University of Michigan Abstract A central
More informationConstructions of Quadratic Bent Functions in Polynomial Forms
1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence
More informationOn equidistant constant weight codes
Discrete Applied Mathematics 128 (2003) 157 164 www.elsevier.com/locate/dam On equidistant constant weight codes Fang-Wei Fu a;1, Torleiv KlHve b; ;2, Yuan Luo c, Victor K. Wei b a Temasek Laboratories,
More informationAn Application of Coding Theory into Experimental Design Construction Methods for Unequal Orthogonal Arrays
The 2006 International Seminar of E-commerce Academic and Application Research Tainan, Taiwan, R.O.C, March 1-2, 2006 An Application of Coding Theory into Experimental Design Construction Methods for Unequal
More informationOn the minimum distance of LDPC codes based on repetition codes and permutation matrices 1
Fifteenth International Workshop on Algebraic and Combinatorial Coding Theory June 18-24, 216, Albena, Bulgaria pp. 168 173 On the minimum distance of LDPC codes based on repetition codes and permutation
More informationNew Inequalities for q-ary Constant-Weight Codes
New Inequalities for q-ary Constant-Weight Codes Hyun Kwang Kim 1 Phan Thanh Toan 1 1 Department of Mathematics, POSTECH International Workshop on Coding and Cryptography April 15-19, 2013, Bergen (Norway
More informationOn Linear Subspace Codes Closed under Intersection
On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F
More informationBinary construction of quantum codes of minimum distances five and six
Discrete Mathematics 308 2008) 1603 1611 www.elsevier.com/locate/disc Binary construction of quantum codes of minimum distances five and six Ruihu Li a, ueliang Li b a Department of Applied Mathematics
More informationThere is no 2-(22, 8, 4) Block Design
There is no 2-(22, 8, 4) Block Design Richard Bilous, Clement W. H. Lam, Larry H. Thiel, Department of Computer Science and Software Engineering Concordia University Montreal, Québec, Canada H3G 1M8 (Ben)
More informationIN this paper, we will introduce a new class of codes,
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 44, NO 5, SEPTEMBER 1998 1861 Subspace Subcodes of Reed Solomon Codes Masayuki Hattori, Member, IEEE, Robert J McEliece, Fellow, IEEE, and Gustave Solomon,
More informationConstruction ofnew extremal self-dual codes
Discrete Mathematics 263 (2003) 81 91 www.elsevier.com/locate/disc Construction ofnew extremal self-dual codes T. Aaron Gulliver a;, Masaaki Harada b, Jon-Lark Kim c a Department of Electrical and Computer
More informationAn Extremal Doubly Even Self-Dual Code of Length 112
An Extremal Doubly Even Self-Dual Code of Length 112 Masaaki Harada Department of Mathematical Sciences Yamagata University Yamagata 990 8560, Japan mharada@sci.kj.yamagata-u.ac.jp Submitted: Dec 29, 2007;
More informationOpen Questions in Coding Theory
Open Questions in Coding Theory Steven T. Dougherty July 4, 2013 Open Questions The following questions were posed by: S.T. Dougherty J.L. Kim P. Solé J. Wood Hilbert Style Problems Hilbert Style Problems
More informationConstruction of quasi-cyclic self-dual codes
Construction of quasi-cyclic self-dual codes Sunghyu Han, Jon-Lark Kim, Heisook Lee, and Yoonjin Lee December 17, 2011 Abstract There is a one-to-one correspondence between l-quasi-cyclic codes over a
More informationSecret-sharing with a class of ternary codes
Theoretical Computer Science 246 (2000) 285 298 www.elsevier.com/locate/tcs Note Secret-sharing with a class of ternary codes Cunsheng Ding a, David R Kohel b, San Ling c; a Department of Computer Science,
More informationCodes over Subfields. Chapter Basics
Chapter 7 Codes over Subfields In Chapter 6 we looked at various general methods for constructing new codes from old codes. Here we concentrate on two more specialized techniques that result from writing
More informationDecomposing Bent Functions
2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions
More informationMath 512 Syllabus Spring 2017, LIU Post
Week Class Date Material Math 512 Syllabus Spring 2017, LIU Post 1 1/23 ISBN, error-detecting codes HW: Exercises 1.1, 1.3, 1.5, 1.8, 1.14, 1.15 If x, y satisfy ISBN-10 check, then so does x + y. 2 1/30
More informationNew arcs in projective Hjelmslev planes over Galois rings
New arcs in projective Hjelmslev planes over Galois rings Michael Kiermaier and Axel Kohnert ABSTRACT. It is known that some good linear codes over a finite ring (R-linear codes) arise from interesting
More informationUnsolved Problems in Graph Theory Arising from the Study of Codes*
Unsolved Problems in Graph Theory Arising from the Study of Codes* N. J. A. Sloane Mathematical Sciences Research Center AT&T Bell Laboratories Murray Hill, NJ 07974 1. Two fundamental questions in coding
More informationLecture 17: Perfect Codes and Gilbert-Varshamov Bound
Lecture 17: Perfect Codes and Gilbert-Varshamov Bound Maximality of Hamming code Lemma Let C be a code with distance 3, then: C 2n n + 1 Codes that meet this bound: Perfect codes Hamming code is a perfect
More informationA Projection Decoding of a Binary Extremal Self-Dual Code of Length 40
A Projection Decoding of a Binary Extremal Self-Dual Code of Length 4 arxiv:7.48v [cs.it] 6 Jan 27 Jon-Lark Kim Department of Mathematics Sogang University Seoul, 2-742, South Korea jlkim@sogang.ac.kr
More informationCode design: Computer search
Code design: Computer search Low rate codes Represent the code by its generator matrix Find one representative for each equivalence class of codes Permutation equivalences? Do NOT try several generator
More informationSIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land
SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land Ingmar Land, SIPCom8-1: Information Theory and Coding (2005 Spring) p.1 Overview Basic Concepts of Channel Coding Block Codes I:
More informationTrace Representation of Legendre Sequences
C Designs, Codes and Cryptography, 24, 343 348, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Trace Representation of Legendre Sequences JEONG-HEON KIM School of Electrical and
More informationOn Walsh transform and matrix factorization 1
Eighth International Workshop on Optimal Codes and Related Topics July 10-14, 2017, Sofia, Bulgaria pp. 55-60 On Walsh transform and matrix factorization 1 Iliya Bouyukliev iliyab@math.bas.bg Paskal Piperkov
More informationConstruction of Protographs for QC LDPC Codes With Girth Larger Than 12 1
Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 1 Sunghwan Kim, Jong-Seon No School of Electrical Eng. & Com. Sci. Seoul National University, Seoul, Korea Email: {nodoubt, jsno}@snu.ac.kr
More informationExtended 1-perfect additive codes
Extended 1-perfect additive codes J.Borges, K.T.Phelps, J.Rifà 7/05/2002 Abstract A binary extended 1-perfect code of length n + 1 = 2 t is additive if it is a subgroup of Z α 2 Zβ 4. The punctured code
More informationEfficient Calculation of the Weight. Distributions for Linear Codes over. Large Finite Fields
Contemporary Engineering Sciences, Vol. 9, 0, no. 3, 09-7 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/0.988/ces.0.8 Efficient Calculation of the Weight Distributions for Linear Codes over Large Finite
More informationOn Binary Cyclic Codes with Codewords of Weight Three and Binary Sequences with the Trinomial Property
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 1, JANUARY 2001 421 [4] A. A. Davydov, Constructions and families of covering codes and saturated sets of points in projective geometry, IEEE Trans.
More informationArrangements, matroids and codes
Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde
More informationGraph-based codes for flash memory
1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background
More informationMATH3302. Coding and Cryptography. Coding Theory
MATH3302 Coding and Cryptography Coding Theory 2010 Contents 1 Introduction to coding theory 2 1.1 Introduction.......................................... 2 1.2 Basic definitions and assumptions..............................
More informationConstructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach
Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Shu Lin, Shumei Song, Lan Lan, Lingqi Zeng and Ying Y Tai Department of Electrical & Computer Engineering University of California,
More informationOn Locating-Dominating Codes in Binary Hamming Spaces
Discrete Mathematics and Theoretical Computer Science 6, 2004, 265 282 On Locating-Dominating Codes in Binary Hamming Spaces Iiro Honkala and Tero Laihonen and Sanna Ranto Department of Mathematics and
More informationLecture 4: Linear Codes. Copyright G. Caire 88
Lecture 4: Linear Codes Copyright G. Caire 88 Linear codes over F q We let X = F q for some prime power q. Most important case: q =2(binary codes). Without loss of generality, we may represent the information
More informationOn the Nonexistence of Perfect 2- and 3-Hamming-Error-Correcting Codes over GF(q)
INFORMATION AND CONTROL 16, 396-401 (1970) On the Nonexistence of Perfect 2- and 3-Hamming-Error-Correcting Codes over GF(q) J. H. VAN LINT Technological University Eindhoven, Netherlands Received December
More informationImproved Upper Bounds on Sizes of Codes
880 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 4, APRIL 2002 Improved Upper Bounds on Sizes of Codes Beniamin Mounits, Tuvi Etzion, Senior Member, IEEE, and Simon Litsyn, Senior Member, IEEE
More informationFast Cryptanalysis of the Matsumoto-Imai Public Key Scheme
Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme P. Delsarte Philips Research Laboratory, Avenue Van Becelaere, 2 B-1170 Brussels, Belgium Y. Desmedt Katholieke Universiteit Leuven, Laboratorium
More information