Some New Optimal Ternary Linear Codes

Size: px
Start display at page:

Download "Some New Optimal Ternary Linear Codes"

Transcription

1 Designs, Codes and Cryptography, 12, 5 11 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Some New Optimal Ternary Linear Codes ILIYA BOUKLIEV* Institute of Mathematics, Bulgarian Academy of Sciences, P.O.Box 323, 5000 V. Tarnovo, Bulgaria Communicated by: H. van Tilborg Received February 23, 1996; Revised August 1, 1996; Accepted September 9, 1996 Abstract. Let d 3 (n, k) be the maximum possible minimum Hamming distance of a ternary [n, k, d; 3]-code for given values of n and k. It is proved that d 3 (44, 6) = 27, d 3 (76, 6) = 48, d 3 (94, 6) = 60, d 3 (124, 6) = 81, d 3 (130, 6) = 84, d 3 (134, 6) = 87, d 3 (138, 6) = 90, d 3 (148, 6) = 96, d 3 (152, 6) = 99, d 3 (156, 6) = 102, d 3 (164, 6) = 108, d 3 (170, 6) = 111, d 3 (179, 6) = 117, d 3 (188, 6) = 123, d 3 (206, 6) = 135, d 3 (211, 6) = 138, d 3 (224, 6) = 147, d 3 (228, 6) = 150, d 3 (236, 6) = 156, d 3 (31, 7) = 17 and d 3 (33, 7) = 18. These results are obtained by a descent method for designing good linear codes. Keywords: ternary codes, optimal codes, construction method 1. Introduction Let Fq n be the n-dimensional vector space over the Galois field F q. The Hamming distance between two vectors of Fq n is defined to be the number of coordinates in which they differ. A q-ary linear [n, k, d; q]-code is a k-dimensional linear subspace of Fq n with minimum distance d. A central problem in coding theory is to optimize one of the parameters n, k, d for given values of the other two. Two versions are: Problem 1. Find d q (n, k), the largest value of d for which there exists an [n, k, d; q]-code. Problem 2. Find n q (k, d), the smallest value of n for which there exists an [n, k, d; q]-code. A code which achieves one of these two values is called optimal. Problem 2 for the case of ternary (q = 3) codes has been considered by Hill and Newton [26]. The problem of finding n 3 (k, d) was solved for k 4 for all d, and values of n 3 (5, d) were determined for all but 30 values of d. The works of van Eupen [6], [4], van Eupen and Hill [8], van Eupen, Hamada and Watamori [7], Hamada and Watamori [21], Hamada, Helleseth and Ytrehus [20], Bogdanova and Boukliev [1], and Landgev [14] solve the problem of finding n 3 (k, d) for k = 5 for all d. The problem of finding n 3 (6, d) has been studied by many authors. Results have been obtained by Brouwer and van Eupen [2], Daskalov [3], van Eupen [6], [5], Gulliver [10], * This work was partially supported by the Bulgarian National Science Fund under Grant No. MM - 502/1995. This work was presented in part at the International Workshop OCRT 95, Sozopol, Bulgaria, May 26 June 1, 1995 and at the IEEE International Simposium on Information Theory, Whistler, Canada, September 17 22, 1995.

2 6 BOUKLIEV Gulliver and Bhargava [11], [12], Kschischang and Pasupathy [13], Hamada [15], [16], Hamada and Helleseth [17], [18], [19], Hamada and Watamori [22], Hill [24] and Hill and Greenough [25]. This paper considers ternary codes. In Section 2 a method for construction of good linear codes is presented. Section 3 includes the new results. 2. Construction Method Let S k,q be the set of all column vectors a = (a 1, a 2,...,a k ) t Fq k such that either a 1 = 1 or a 1 = a 2 = =a i 1 = 0, a i = 1 for some integer i in {2, 3,...,k}, where k 3 and Fq k denotes a k-dimensional vector space over F q. Then S k,q consists of all (q k 1)/(q 1) nonzero vectors in Fq k and the vectors in S k,q can be regarded as (q k 1)/(q 1) points in a finite projective geometry PG(k 1,q). A linear code is called projective if no two columns of a generator matrix are linearly dependent. We regard the columns of the generator matrix of a projective code as a subset of S k,q.for any n-element subset of S k,q there is a projective [n, k 0, d; q]-code, k 0 k with a generator matrix containing these elements as columns. Denote by T (C) the set of the columns of the generator matrix of the code C, considered as elements of S k,q. The Griesmer bound [9], [28] provides an important lower bound on n q (k, d): k 1 n q (k, d) g q (k, d) = d/q i. i=0 LEMMA 1 ([23]) Suppose that d q k 1 andthatcisan[n,k,d;q]-code which attains the Griesmer bound. Then C is projective. The problem of the construction of a [g q (k, d), k, d; q] code (if such a code exists) can be formulated in the following way: Find n elements of S k,q such that the [n, k, d; q] code meets the Griesmer bound. We use the following notations: 1. Each n-element subset of S k,q is called a solution. 2. The substitution of a given element of a solution s by another one is called an elementary transformation. 3. The neighbourhood N(s) of a solution s is the set of all solutions s that can be obtained from s by an elementary transformation. 4. We define the evaluation function by f (s) = d min (s)q k + q k A dmin (s), where d min (s) is the minimum distance of the corresponding code and A dmin (s) is the number of codewords of minimum weight in the corresponding code.

3 SOME NEW OPTIMAL TERNARY LINEAR CODES 7 The problem of the construction of a [g q (k, d), k, d; q] code (if such one exists) if considered as a combinatorial optimization problem is the following max{ f (s), s S k,q, s =n}. The construction method is based on the next heuristic algorithm: variables s, s : solution; Number of Descents:integer; begin Number of Descents:=Random(1000); while Number of Descents>0 do begin {descent } Get Initial Solution (s); while exists s in N(s) such that f(s ) > f(s) do s:=s ; if d min (s) = d target then Output Solution (s); Number of Descents:=Number of Descents 1; end; {descent } end. The initial solution s can be chosen in several ways: (i) By using a code C with parameters [n l, k, d δ; q] where δ l. In this case l elements from S k,q, not belonging to T (C ) are randomly added to T (C ). (ii) By using a code C with parameters [n + l, k, d + l 1; q]. In this case l elements of T (C ) are randomly deleted. This algorithm can be used for constructing optimal codes not meeting the Griesmer bound. If d > q k 1 the set S k,q must be taken several times. For all codes constructed in the paper by this method the set S k,q is taken twice. Some examples are given in the next table: Initial Solution Result [120, 6, 78; 3] [124, 6, 81; 3] [124, 6, 81; 3] [130, 6, 84; 3] [160, 6, 105; 3] [156, 6, 102; 3] [156, 6, 102; 3] [152, 6, 99; 3] Other versions of the descent method are used in [11], [27]. 3. The New Results The results in dimension 6 are summarized in Theorem 1.

4 8 BOUKLIEV THEOREM 1 There exist codes with parameters (i) [44, 6, 27; 3], [76, 6, 48; 3], [94, 6, 60; 3], [124, 6, 81; 3], [130, 6, 84; 3], [134, 6, 87; 3], [138, 6, 90; 3], [148, 6, 96; 3], [152, 6, 99; 3], [156, 6, 102; 3], [164, 6, 108; 3], [170, 6, 111; 3], [179, 6, 117; 3], [188, 6, 123; 3],[206, 6, 135; 3] [211, 6, 138; 3], [224, 6, 147; 3], and [236, 6, 156; 3]; (ii) [228, 6, 150; 3]. Proof. (i) Codes with such parameters are constructed by the method from Section 2. Theirweight enumerators are: [44, 6, 27; 3] z z z z 36, [76, 6, 48; 3] z z z z 57, [94, 6, 60; 3] z z z z 72, [124, 6, 81; 3] z z z 99, [130, 6, 84; 3] z z z z z z z 105, [134, 6, 87; 3] z z z z z 105, [138, 6, 90; 3] z z z z 117, [148, 6, 96; 3] z z z z z 114, [152, 6, 99; 3] z z z z z 117, [156, 6, 102; 3] z z z z z 120, [164, 6, 108; 3] z z z 126, [170, 6, 111; 3] z z z z z z z 132, [179, 6, 117; 3] z z z z z z z z 141, [188, 6, 123; 3] z z z z z 141, [206, 6, 135; 3] z z z 153, [211, 6, 138; 3] z z z z z 162, [224, 6, 147; 3] z z z z 171 [236, 6, 156; 3] z z z z 183. The description of the corresponding generator matrices is given in Appendix. (ii) This code has been constructed as a quasi-twisted one with a generator matrix consisting of 38 twistulant matrices with first rows , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , The weight enumerator of the code is z z z z 174. For quasi-twisted codes see [25]. All codes described above are optimal with respect to minimum distance (See [22]). THEOREM 2 d 3 (31, 7) = 17 and d 3 (33, 7) = 18. Proof. From [22] we have d 3 (31, 7) 17 and d 3 (33, 7) 18.

5 SOME NEW OPTIMAL TERNARY LINEAR CODES 9 Codes with parameters [31, 7, 17; 3] and [33, 7, 18; 3] were constructed by the method from Section 2. Their weight enumerators and generator matrices are [31, 7, 17; 3] 1+324z z z z z z z z z 25 +2z 27, [33, 7, 18; 3] 1+348z z z z z z z z z z 27, Appendix. Generator Matrices of Codes from Theorem 1 Let the vectors from S k,q be arranged in lexicographic order. A generator matrix of a projective code is represented by a binary vector of length (q k 1)/(q 1) with 1 indicating the presence, and 0 the absence of a vector of S k,q. This binary vector is then broken into blocks of length 4, each of which is represented by a hexadecimal symbol from {0, 1,...,9,a,b,c,d,e, f}. If it is necessary the last block is beforehand completed by zeroes. Example. if q = 3 and k = 3 the set S k,q looks like that: Then the code [8,3,4;3] with generator matrix:

6 10 BOUKLIEV is represented in the following way: (2) = e1d8 (16). [44, 6, 27; 3] c a a a008; [76, 6, 48; 3] 1420a c80c bc c00100; [94, 6, 60; 3] d200842d b84c451e e310 03a ; [124, 6, 81; 3] 1660b c c28342d1089dec0132d20c f213c c025e011 0d002133a19; [129, 6, 83; 3] 1662b c c29342d1589dec0132d20c c0906f213c e011 0d002133a19; [134, 6, 87; 3] 1661b c d039c29342d1589dec0932d20c c0906f213c c025e011 0d002133a19; [138, 6, 90; 3] e044040c0131bdea210f0dc bead20051c8cac7e1736bfd4c47018a03108be aa551005; [148, 6, 96; 3] dead645c41e21901a06a2be29d29216b ae100b1a39a24a98dc560450b34a a8a5 710ad281951; [152, 6, 99; 3] b5b2c052d9d b06672d02da52722b95b05114e8a d369144b26a281f80b b2222b94; [156, 6, 102; 3] b5b2c0d2d9d b06672d02da52722b95b05114e8a d369144b26a281f82b b2222b95; [164, 6, 108; 3] b5b2c0d2d9d c2b06672d02da52722b95b05134e8e d369144b26a283f82b b2223b95; [170, 6, 111; 3] c356044b3608e7ea401fdc68fc220b81aec773b b646f90976b1f70bcd16826efb ad2248d2bd8; [178, 6, 116; 3] 02dfe85c357684b364ae7ea401f9c68ec220a018ec773b b646f90976b1f709cd16826efb ad2268d2bdc; [188, 6, 123; 3] 23c00946aaa542cf23c2917cf5671ea541c19e721db71faf34805eee30b5db22c73add2d373acb4d d6bbad7cc47; [206, 6, 135; 3] 35f8e77d3d485b5bde09ffab016fe33ed74d9c3c761a2f13caffd5024f437df4dfe5141f96d26fbb 54f65f18121; [210, 6, 137; 3] 29d1265f7c4335e369467dae2dedf1ae49c7b9f8b1ee8e1b36d36c96b5861beefb60f6dde597e7f4 d1b6bfae12d; [224, 6, 147; 3] fba476f5c3cd0be3bced71eeead37a785ea734de5ed9ca37e7adacedd7ca3f6b6add57b1ddd71cee f8728fad3d3; [12, 6, 6; 3] the extended ternary Golay code, a0000; The generator matrices of the [130,6,84;3], [179,6,117;3] and [211,6,138;3] codes are obtained by adding the vectors (0,1,0,1,2,2) t, (0,1,0,0,0,1) t and (1,2,1,2,1,2) t respectively to the generator matrices of the [129,6,83;3], [178,6,116;3] and [210,6,137;3] codes. We obtain a generator matrix of a non-projective [236,6,156;3] code concatenating the generator matrices of the [12,6,6;3] and [224,6,147;3] codes given above. Acknowledgments The author thanks Prof. S. Dodunekov, Prof. S. Kapralov and Dr. R. Daskalov for their helpful remarks.

7 SOME NEW OPTIMAL TERNARY LINEAR CODES 11 References 1. G. Bogdanova and I. Boukliev, New linear codes of dimension 5 over GF(3), Proc. Inter. Workshop ACCT-94, Novgorod, Russia (1994) pp A. E. Brouwer and M. van Eupen, The correspondence between projective codes and 2-weight codes, Designs, Codes and Cryptography (to appear). 3. R. N. Daskalov, Bounds for binary and ternary linear codes, Ph.D. Thesis (1993). 4. M. van Eupen, Five new optimal ternary linear codes, IEEE Trans. Info. Theory, Vol. 40 (1994) p M. van Eupen, Four non-existence results for ternary linear codes, IEEE Trans. Inform. Theory, Vol. 41 (1995) pp M. van Eupen, Some new results for ternary linear codes of dimension 5 and 6, IEEE Trans. Inform. Theory, Vol. 41, No. 6 (1995) pp M. van Eupen, N. Hamada and Y. Watamori, The nonexistence of ternary [50, 5, 32] codes, Designs, Codes and Cryptography, Vol. 7, No. 3 (1996) pp M. van Eupen and R. Hill, An optimal termary [69, 5, 45] code and related codes, Designs, Codes and Cryptography, Vol. 4, No. 3 (1994) pp J. H. Griesmer, A bound for error-correcting codes, IBM J. Res. Devel., Vol. 4 (1960) pp T. A. Gulliver, New optimal ternary linear codes, IEEE Trans. Inform. Theory, Vol. 41 (1995) pp T. A. Gulliver and V. K. Bhargava, Some best rate 1/p and rate (p 1)/p systematic quasi-cyclic codes over GF(3) and GF(4), IEEE Trans. Inform. Theory, Vol. 38 (1992) pp T. A. Gulliver and V. K. Bhargava, New good rate (m 1)/pm ternary and quaternary quasi-cyclic codes, Designs, Codes and Cryptography (to appear). 13. F. R. Kschischang and S. Pasupathy, Some ternary and quaternary codes and associated sphere packings, IEEE Trans. Inform. Theory, Vol. 38 (1992) pp I. Landgev, Nonexistence of [143, 5, 94] 3 Codes, Proc. Inter. Workshop OCRT 95, Sozopol, Bulgaria (1995) pp N. Hamada, A survey of recent work on characterization of minihypers in PG(t,q) and nonbinary linear codes meeting the Griesmer bound, J. Combin. Inform. Syst. Sci., Vol. 18 (1993) pp N. Hamada, The nonexistence of [303, 6, 201; 3]-codes meeting the Griesmer bound, Technical Report OWUAM-009, Osaka Women s Univ., Sakai, Osaka 590, Japan (1995). 17. N. Hamada and T. Helleseth, The uniqueness of [87, 5, 57; 33]-codes and the nonexistence of [258, 6, 171; 3]-codes, J. Statist. Plann. Inference (to appear). 18. N. Hamada and T. Helleseth, Construction of some optimal ternary codes and the uniqueness of [294, 6, 195; 3]-codes meeting the Griesmer bound, Finite Field and Their Application, Vol. 1 (1995) pp N. Hamada and T. Helleseth, The nonexistence of ternary [270, 6, 179] codes and [309, 6, 205] codes, Proc. Inter. Workshop OCRT 95, Sozopol, Bulgaria (1995) pp N. Hamada, T. Helleseth and Ø. Ytrehus, On the construction of a [q 4 +q 2 q, 5, q 4 q 3 +q 2 2q; q]-code meeting the Griesmer bound, Designs, Codes and Cryptography, Vol. 2 (1992) pp N. Hamada and Y. Watamori, The nonexistence of [71, 5, 46; 3]-codes, J. Statist. Plann. Inference (to appear). 22. N. Hamada and Y. Watamori, The nonexistence of some ternary linear codes of dimension 6 and the bounds for n 3 (6, d), 1 d 243, Math. Japonica, Vol. 43 (1996) pp R. Hill, Optimal Linear Codes: Cryptography and Coding II (C. Mitchell, ed.), Oxford University Press (1992) pp R. Hill, Caps and codes, Discrete Math., Vol. 22 (1978) pp R. Hill and P. P. Greenough, Optimal quasi-twisted codes, Proc. Inter. Workshop ACCT-92, Voneshta voda, Bulgaria (1992) pp R. Hill and D. E. Newton, Optimal ternary linear codes, Designs, Codes and Cryptography, Vol. 2, No. 2 (1992) pp A. Said and R. Palazzo, Heuristic search: A new method to design good unit memory convolutional codes, Proc. Fourth Swedish-Soviet Inter. Workshop on Inf. Theory, Gotland, Sweden (1989) pp G. Solomon and J. J. Stiffler, Algebraically punctured cyclic codes, Inform. and Control., Vol. 8 (1965) pp

The Structure of 1-Generator Quasi-Twisted Codes and New Linear Codes

The Structure of 1-Generator Quasi-Twisted Codes and New Linear Codes C Designs, Codes and Cryptography, 24, 313 326, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. The Structure of 1-Generator Quasi-Twisted Codes and New Linear Codes NUH AYDIN Department

More information

On the properness of some optimal binary linear codes and their dual codes

On the properness of some optimal binary linear codes and their dual codes Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 76-81 On the properness of some optimal binary linear codes and their dual codes Rossitza

More information

Necklaces: Generalizations

Necklaces: Generalizations Necklaces: Generalizations V Ch Venkaiah V Ch Venkaiah is presently with the School of Computer and Information Sciences, University of Hyderabad. Prior to that he served in several organizations including

More information

Matrix characterization of linear codes with arbitrary Hamming weight hierarchy

Matrix characterization of linear codes with arbitrary Hamming weight hierarchy Linear Algebra and its Applications 412 (2006) 396 407 www.elsevier.com/locate/laa Matrix characterization of linear codes with arbitrary Hamming weight hierarchy G. Viswanath, B. Sundar Rajan Department

More information

On non-antipodal binary completely regular codes

On non-antipodal binary completely regular codes On non-antipodal binary completely regular codes J. Borges, J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, 08193-Bellaterra, Spain. V.A. Zinoviev Institute

More information

Some codes related to BCH-codes of low dimension

Some codes related to BCH-codes of low dimension Discrete Mathematics 205 (1999) 57 64 www.elsevier.com/locate/disc Some codes related to BCH-codes of low dimension Yves Edel a,jurgen Bierbrauer b; a Mathematisches Institut der Universitat, Im Neuenheimer

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

Enumeration of Generalized Necklaces over F q

Enumeration of Generalized Necklaces over F q Enumeration of Generalized Necklaces over F q by Jumah Ali Algallaf B.Sc., King Fahd University of Petroleum and Minerals, Saudi Arabia, 2006 A Project Report Submitted in Partial Fulfillment of the Requirements

More information

International Mathematical Forum, Vol. 6, 2011, no. 4, Manjusri Basu

International Mathematical Forum, Vol. 6, 2011, no. 4, Manjusri Basu International Mathematical Forum, Vol 6, 011, no 4, 185-191 Square Designs on New Binary ( 3n 1, 3 n ) Codes Manjusri Basu Department of Mathematics University of Kalyani Kalyani, WB, India, Pin-74135

More information

Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes

Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Nuh Aydin and Tsvetan Asamov Department of Mathematics Kenyon College Gambier, OH 43022 {aydinn,asamovt}@kenyon.edu

More information

Extended Binary Linear Codes from Legendre Sequences

Extended Binary Linear Codes from Legendre Sequences Extended Binary Linear Codes from Legendre Sequences T. Aaron Gulliver and Matthew G. Parker Abstract A construction based on Legendre sequences is presented for a doubly-extended binary linear code of

More information

IN [1] Kiermaier and Zwanzger construct the extended dualized Kerdock codes ˆK

IN [1] Kiermaier and Zwanzger construct the extended dualized Kerdock codes ˆK New upper bounds on binary linear codes and a Z 4 -code with a better-than-linear Gray image Michael Kiermaier, Alfred Wassermann, and Johannes Zwanzger 1 arxiv:1503.03394v2 [cs.it] 16 Mar 2016 Abstract

More information

The Binary Self-Dual Codes of Length Up To 32: A Revised Enumeration*

The Binary Self-Dual Codes of Length Up To 32: A Revised Enumeration* The Binary Self-Dual Codes of Length Up To 32: A Revised Enumeration* J. H. Conway Mathematics Department Princeton University Princeton, New Jersey 08540 V. Pless** Mathematics Department University of

More information

We saw in the last chapter that the linear Hamming codes are nontrivial perfect codes.

We saw in the last chapter that the linear Hamming codes are nontrivial perfect codes. Chapter 5 Golay Codes Lecture 16, March 10, 2011 We saw in the last chapter that the linear Hamming codes are nontrivial perfect codes. Question. Are there any other nontrivial perfect codes? Answer. Yes,

More information

On the Griesmer bound for nonlinear codes

On the Griesmer bound for nonlinear codes On the Griesmer bound for nonlinear codes Emanuele Bellini, Alessio Meneghetti To cite this version: Emanuele Bellini, Alessio Meneghetti. On the Griesmer bound for nonlinear codes. Pascale Charpin, Nicolas

More information

Symmetric configurations for bipartite-graph codes

Symmetric configurations for bipartite-graph codes Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 63-69 Symmetric configurations for bipartite-graph codes Alexander Davydov adav@iitp.ru

More information

NEW BINARY EXTREMAL SELF-DUAL CODES OF LENGTHS 50 AND 52. Stefka Buyuklieva

NEW BINARY EXTREMAL SELF-DUAL CODES OF LENGTHS 50 AND 52. Stefka Buyuklieva Serdica Math. J. 25 (1999), 185-190 NEW BINARY EXTREMAL SELF-DUAL CODES OF LENGTHS 50 AND 52 Stefka Buyuklieva Communicated by R. Hill Abstract. New extremal binary self-dual codes of lengths 50 and 52

More information

A Note on Non-Existence of (8,4)-2 Burst Error Correcting Code

A Note on Non-Existence of (8,4)-2 Burst Error Correcting Code Applied Mathematical Sciences, Vol. 4, 2010, no. 44, 2201-2205 A Note on Non-Existence of (8,4)-2 Burst Error Correcting Code Navneet Singh Rana Research Scholar, Department of Mathematics University of

More information

Galois geometries contributing to coding theory

Galois geometries contributing to coding theory Ghent University Dept. of Pure Mathematics and Computer Algebra Krijgslaan 281 - S22 9000 Ghent Belgium Thurnau, April 15, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 EXTENDABILITY RESULTS

More information

Secret Sharing Schemes from a Class of Linear Codes over Finite Chain Ring

Secret Sharing Schemes from a Class of Linear Codes over Finite Chain Ring Journal of Computational Information Systems 9: 7 (2013) 2777 2784 Available at http://www.jofcis.com Secret Sharing Schemes from a Class of Linear Codes over Finite Chain Ring Jianzhang CHEN, Yuanyuan

More information

7.1 Definitions and Generator Polynomials

7.1 Definitions and Generator Polynomials Chapter 7 Cyclic Codes Lecture 21, March 29, 2011 7.1 Definitions and Generator Polynomials Cyclic codes are an important class of linear codes for which the encoding and decoding can be efficiently implemented

More information

Plotkin s Bound in Codes Equipped with the Euclidean Weight Function

Plotkin s Bound in Codes Equipped with the Euclidean Weight Function Tamsui Oxford Journal of Mathematical Sciences 5() (009) 07-4 Aletheia University Plotkin s Bound in Codes Equipped with the Euclidean Weight Function Sapna Jain Department of Mathematics, University of

More information

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes ELEC 519A Selected Topics in Digital Communications: Information Theory Hamming Codes and Bounds on Codes Single Error Correcting Codes 2 Hamming Codes (7,4,3) Hamming code 1 0 0 0 0 1 1 0 1 0 0 1 0 1

More information

CONSTRUCTION OF (SOMETIMES) OPTIMAL LINEAR CODES

CONSTRUCTION OF (SOMETIMES) OPTIMAL LINEAR CODES CONSTRUCTION OF (SOMETIMES) OPTIMAL LINEAR CODES MICHAEL BRAUN, AXEL KOHNERT AND ALFRED WASSERMANN 1. INTRODUCTION For the purpose of error correcting linear codes over a finite field GF (q) and fixed

More information

Galois geometries contributing to coding theory

Galois geometries contributing to coding theory Ghent University Dept. of Mathematics Krijgslaan 281 - S22 9000 Ghent Belgium Opatija, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 COVERING RADIUS AND SATURATING SETS 4 LINEAR MDS CODES

More information

LDPC codes based on Steiner quadruple systems and permutation matrices

LDPC codes based on Steiner quadruple systems and permutation matrices Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory September 7 13, 2014, Svetlogorsk (Kaliningrad region), Russia pp. 175 180 LDPC codes based on Steiner quadruple systems and

More information

Low-complexity error correction in LDPC codes with constituent RS codes 1

Low-complexity error correction in LDPC codes with constituent RS codes 1 Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 348-353 Low-complexity error correction in LDPC codes with constituent RS codes 1

More information

ON THE STRUCTURE OF (t mod q)-arcs IN FINITE PROJECTIVE GEOMETRIES

ON THE STRUCTURE OF (t mod q)-arcs IN FINITE PROJECTIVE GEOMETRIES GODIXNIK NA SOFI SKI UNIVERSITET SV. KLIMENT OHRIDSKI FAKULTET PO MATEMATIKA I INFORMATIKA Tom 103 ANNUAL OF SOFIA UNIVERSITY ST. KLIMENT OHRIDSKI FACULTY OF MATHEMATICS AND INFORMATICS Volume 103 ON THE

More information

ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES

ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES ANDRIES E. BROUWER, ARJEH M. COHEN, MAN V.M. NGUYEN Abstract. All mixed (or asymmetric) orthogonal arrays of strength 3 with run size at most 64 are

More information

CONSTRUCTION OF QUASI-CYCLIC CODES

CONSTRUCTION OF QUASI-CYCLIC CODES CONSTRUCTION OF QUASI-CYCLIC CODES by Thomas Aaron Gulliver B.Sc., 1982 and M.Sc., 1984 University of New Brunswick A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF

More information

On permutation automorphism groups of q-ary Hamming codes

On permutation automorphism groups of q-ary Hamming codes Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 28, Pamporovo, Bulgaria pp. 119-124 On permutation automorphism groups of q-ary Hamming codes Evgeny V. Gorkunov

More information

New binary self-dual codes of lengths 50 to 60

New binary self-dual codes of lengths 50 to 60 Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) New binary self-dual codes of lengths 50 to 60 Nikolay Yankov Moon Ho Lee Received: date / Accepted: date Abstract Using

More information

FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES

FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES ANDRIES E. BROUWER, ARJEH M. COHEN, MAN V.M. NGUYEN Abstract. All mixed (or asymmetric) orthogonal arrays of strength 3 with run size at most

More information

On the construction of small (l, t)-blocking sets in PG(2, q)

On the construction of small (l, t)-blocking sets in PG(2, q) Sofia, 10-14 July 2017 p. 1 On the construction of small (l, t)-blocking sets in PG(2, q) Rumen Daskalov, Elena Metodieva Department of Mathematics and Informatics Technical University of Gabrovo 5300

More information

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows. EE 387 October 28, 2015 Algebraic Error-Control Codes Homework #4 Solutions Handout #24 1. LBC over GF(5). Let G be a nonsystematic generator matrix for a linear block code over GF(5). 2 4 2 2 4 4 G =

More information

The Witt designs, Golay codes and Mathieu groups

The Witt designs, Golay codes and Mathieu groups The Witt designs, Golay codes and Mathieu groups 1 The Golay codes Let V be a vector space over F q with fixed basis e 1,..., e n. A code C is a subset of V. A linear code is a subspace of V. The vector

More information

ON A TWO-DIMENSIONAL SEARCH PROBLEM. Emil Kolev, Ivan Landgev

ON A TWO-DIMENSIONAL SEARCH PROBLEM. Emil Kolev, Ivan Landgev Serdica Math. J. 21 (1995), 219-230 ON A TWO-DIMENSIONAL SEARCH PROBLEM Emil Kolev, Ivan Landgev Communicated by R. Hill Abstract. In this article we explore the so-called two-dimensional tree search problem.

More information

Construction of a (64, 2 37, 12) Code via Galois Rings

Construction of a (64, 2 37, 12) Code via Galois Rings Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T

More information

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,

More information

On q-ary optimal equitable symbol weight codes

On q-ary optimal equitable symbol weight codes On q-ary optimal equitable symbol weight codes 1/20 On q-ary optimal equitable symbol weight codes L. A. Bassalygo, V.A. Zinoviev A.A. Kharkevich Institute for Problems of Information Transmission, Moscow,

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

On the Algebraic Structure of Quasi-Cyclic Codes I: Finite Fields

On the Algebraic Structure of Quasi-Cyclic Codes I: Finite Fields IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 47, NO 7, NOVEMBER 2001 2751 On the Algebraic Structure of Quasi-Cyclic Codes I: Finite Fields San Ling Patrick Solé, Member, IEEE Abstract A new algebraic

More information

Support weight enumerators and coset weight distributions of isodual codes

Support weight enumerators and coset weight distributions of isodual codes Support weight enumerators and coset weight distributions of isodual codes Olgica Milenkovic Department of Electrical and Computer Engineering University of Colorado, Boulder March 31, 2003 Abstract In

More information

PAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES

PAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES International Journal of Pure and Applied Mathematics Volume 85 No. 6 013, 1001-1008 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/10.173/ijpam.v85i6.3

More information

Multiple coverings of the farthest-off points and multiple saturating sets in projective spaces

Multiple coverings of the farthest-off points and multiple saturating sets in projective spaces Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory June 15-21, 2012, Pomorie, Bulgaria pp. 53 59 Multiple coverings of the farthest-off points and multiple saturating sets in

More information

There are no Barker arrays having more than two dimensions

There are no Barker arrays having more than two dimensions There are no Barker arrays having more than two dimensions Jonathan Jedwab Matthew G. Parker 5 June 2006 (revised 7 December 2006) Abstract Davis, Jedwab and Smith recently proved that there are no 2-dimensional

More information

Permutation decoding for the binary codes from triangular graphs

Permutation decoding for the binary codes from triangular graphs Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for

More information

Vector spaces. EE 387, Notes 8, Handout #12

Vector spaces. EE 387, Notes 8, Handout #12 Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is

More information

Chapter 7 Reed Solomon Codes and Binary Transmission

Chapter 7 Reed Solomon Codes and Binary Transmission Chapter 7 Reed Solomon Codes and Binary Transmission 7.1 Introduction Reed Solomon codes named after Reed and Solomon [9] following their publication in 1960 have been used together with hard decision

More information

Binary Convolutional Codes of High Rate Øyvind Ytrehus

Binary Convolutional Codes of High Rate Øyvind Ytrehus Binary Convolutional Codes of High Rate Øyvind Ytrehus Abstract The function N(r; ; d free ), defined as the maximum n such that there exists a binary convolutional code of block length n, dimension n

More information

Extending MDS Codes. T. L. Alderson

Extending MDS Codes. T. L. Alderson Extending MDS Codes T. L. Alderson Abstract A q-ary (n,k)-mds code, linear or not, satisfies n q + k 1. A code meeting this bound is said to have maximum length. Using purely combinatorial methods we show

More information

On Construction of a Class of. Orthogonal Arrays

On Construction of a Class of. Orthogonal Arrays On Construction of a Class of Orthogonal Arrays arxiv:1210.6923v1 [cs.dm] 25 Oct 2012 by Ankit Pat under the esteemed guidance of Professor Somesh Kumar A Dissertation Submitted for the Partial Fulfillment

More information

(Reprint of pp in Proc. 2nd Int. Workshop on Algebraic and Combinatorial coding Theory, Leningrad, Sept , 1990)

(Reprint of pp in Proc. 2nd Int. Workshop on Algebraic and Combinatorial coding Theory, Leningrad, Sept , 1990) (Reprint of pp. 154-159 in Proc. 2nd Int. Workshop on Algebraic and Combinatorial coding Theory, Leningrad, Sept. 16-22, 1990) SYSTEMATICITY AND ROTATIONAL INVARIANCE OF CONVOLUTIONAL CODES OVER RINGS

More information

5.0 BCH and Reed-Solomon Codes 5.1 Introduction

5.0 BCH and Reed-Solomon Codes 5.1 Introduction 5.0 BCH and Reed-Solomon Codes 5.1 Introduction A. Hocquenghem (1959), Codes correcteur d erreurs; Bose and Ray-Chaudhuri (1960), Error Correcting Binary Group Codes; First general family of algebraic

More information

SPHERE PACKINGS CONSTRUCTED FROM BCH AND JUSTESEN CODES

SPHERE PACKINGS CONSTRUCTED FROM BCH AND JUSTESEN CODES SPHERE PACKINGS CONSTRUCTED FROM BCH AND JUSTESEN CODES N. J. A. SLOANE Abstract. Bose-Chaudhuri-Hocquenghem and Justesen codes are used to pack equa spheres in M-dimensional Euclidean space with density

More information

ON PERTURBATION OF BINARY LINEAR CODES. PANKAJ K. DAS and LALIT K. VASHISHT

ON PERTURBATION OF BINARY LINEAR CODES. PANKAJ K. DAS and LALIT K. VASHISHT Math Appl 4 (2015), 91 99 DOI: 1013164/ma201507 ON PERTURBATION OF BINARY LINEAR CODES PANKAJ K DAS and LALIT K VASHISHT Abstract We present new codes by perturbation of rows of the generating matrix of

More information

CLASSICAL error control codes have been designed

CLASSICAL error control codes have been designed IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 56, NO 3, MARCH 2010 979 Optimal, Systematic, q-ary Codes Correcting All Asymmetric and Symmetric Errors of Limited Magnitude Noha Elarief and Bella Bose, Fellow,

More information

Finite geometry codes, generalized Hadamard matrices, and Hamada and Assmus conjectures p. 1/2

Finite geometry codes, generalized Hadamard matrices, and Hamada and Assmus conjectures p. 1/2 Finite geometry codes, generalized Hadamard matrices, and Hamada and Assmus conjectures Vladimir D. Tonchev a Department of Mathematical Sciences Michigan Technological University Houghton, Michigan 49931,

More information

On the Classification of Splitting (v, u c, ) BIBDs

On the Classification of Splitting (v, u c, ) BIBDs BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 5 Special Thematic Issue on Optimal Codes and Related Topics Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081

More information

Advanced Engineering Mathematics Prof. Pratima Panigrahi Department of Mathematics Indian Institute of Technology, Kharagpur

Advanced Engineering Mathematics Prof. Pratima Panigrahi Department of Mathematics Indian Institute of Technology, Kharagpur Advanced Engineering Mathematics Prof. Pratima Panigrahi Department of Mathematics Indian Institute of Technology, Kharagpur Lecture No. # 02 Vector Spaces, Subspaces, linearly Dependent/Independent of

More information

Type I Codes over GF(4)

Type I Codes over GF(4) Type I Codes over GF(4) Hyun Kwang Kim San 31, Hyoja Dong Department of Mathematics Pohang University of Science and Technology Pohang, 790-784, Korea e-mail: hkkim@postech.ac.kr Dae Kyu Kim School of

More information

An Analytic Approach to the Problem of Matroid Representibility: Summer REU 2015

An Analytic Approach to the Problem of Matroid Representibility: Summer REU 2015 An Analytic Approach to the Problem of Matroid Representibility: Summer REU 2015 D. Capodilupo 1, S. Freedman 1, M. Hua 1, and J. Sun 1 1 Department of Mathematics, University of Michigan Abstract A central

More information

Constructions of Quadratic Bent Functions in Polynomial Forms

Constructions of Quadratic Bent Functions in Polynomial Forms 1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence

More information

On equidistant constant weight codes

On equidistant constant weight codes Discrete Applied Mathematics 128 (2003) 157 164 www.elsevier.com/locate/dam On equidistant constant weight codes Fang-Wei Fu a;1, Torleiv KlHve b; ;2, Yuan Luo c, Victor K. Wei b a Temasek Laboratories,

More information

An Application of Coding Theory into Experimental Design Construction Methods for Unequal Orthogonal Arrays

An Application of Coding Theory into Experimental Design Construction Methods for Unequal Orthogonal Arrays The 2006 International Seminar of E-commerce Academic and Application Research Tainan, Taiwan, R.O.C, March 1-2, 2006 An Application of Coding Theory into Experimental Design Construction Methods for Unequal

More information

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1 Fifteenth International Workshop on Algebraic and Combinatorial Coding Theory June 18-24, 216, Albena, Bulgaria pp. 168 173 On the minimum distance of LDPC codes based on repetition codes and permutation

More information

New Inequalities for q-ary Constant-Weight Codes

New Inequalities for q-ary Constant-Weight Codes New Inequalities for q-ary Constant-Weight Codes Hyun Kwang Kim 1 Phan Thanh Toan 1 1 Department of Mathematics, POSTECH International Workshop on Coding and Cryptography April 15-19, 2013, Bergen (Norway

More information

On Linear Subspace Codes Closed under Intersection

On Linear Subspace Codes Closed under Intersection On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F

More information

Binary construction of quantum codes of minimum distances five and six

Binary construction of quantum codes of minimum distances five and six Discrete Mathematics 308 2008) 1603 1611 www.elsevier.com/locate/disc Binary construction of quantum codes of minimum distances five and six Ruihu Li a, ueliang Li b a Department of Applied Mathematics

More information

There is no 2-(22, 8, 4) Block Design

There is no 2-(22, 8, 4) Block Design There is no 2-(22, 8, 4) Block Design Richard Bilous, Clement W. H. Lam, Larry H. Thiel, Department of Computer Science and Software Engineering Concordia University Montreal, Québec, Canada H3G 1M8 (Ben)

More information

IN this paper, we will introduce a new class of codes,

IN this paper, we will introduce a new class of codes, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 44, NO 5, SEPTEMBER 1998 1861 Subspace Subcodes of Reed Solomon Codes Masayuki Hattori, Member, IEEE, Robert J McEliece, Fellow, IEEE, and Gustave Solomon,

More information

Construction ofnew extremal self-dual codes

Construction ofnew extremal self-dual codes Discrete Mathematics 263 (2003) 81 91 www.elsevier.com/locate/disc Construction ofnew extremal self-dual codes T. Aaron Gulliver a;, Masaaki Harada b, Jon-Lark Kim c a Department of Electrical and Computer

More information

An Extremal Doubly Even Self-Dual Code of Length 112

An Extremal Doubly Even Self-Dual Code of Length 112 An Extremal Doubly Even Self-Dual Code of Length 112 Masaaki Harada Department of Mathematical Sciences Yamagata University Yamagata 990 8560, Japan mharada@sci.kj.yamagata-u.ac.jp Submitted: Dec 29, 2007;

More information

Open Questions in Coding Theory

Open Questions in Coding Theory Open Questions in Coding Theory Steven T. Dougherty July 4, 2013 Open Questions The following questions were posed by: S.T. Dougherty J.L. Kim P. Solé J. Wood Hilbert Style Problems Hilbert Style Problems

More information

Construction of quasi-cyclic self-dual codes

Construction of quasi-cyclic self-dual codes Construction of quasi-cyclic self-dual codes Sunghyu Han, Jon-Lark Kim, Heisook Lee, and Yoonjin Lee December 17, 2011 Abstract There is a one-to-one correspondence between l-quasi-cyclic codes over a

More information

Secret-sharing with a class of ternary codes

Secret-sharing with a class of ternary codes Theoretical Computer Science 246 (2000) 285 298 www.elsevier.com/locate/tcs Note Secret-sharing with a class of ternary codes Cunsheng Ding a, David R Kohel b, San Ling c; a Department of Computer Science,

More information

Codes over Subfields. Chapter Basics

Codes over Subfields. Chapter Basics Chapter 7 Codes over Subfields In Chapter 6 we looked at various general methods for constructing new codes from old codes. Here we concentrate on two more specialized techniques that result from writing

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

Math 512 Syllabus Spring 2017, LIU Post

Math 512 Syllabus Spring 2017, LIU Post Week Class Date Material Math 512 Syllabus Spring 2017, LIU Post 1 1/23 ISBN, error-detecting codes HW: Exercises 1.1, 1.3, 1.5, 1.8, 1.14, 1.15 If x, y satisfy ISBN-10 check, then so does x + y. 2 1/30

More information

New arcs in projective Hjelmslev planes over Galois rings

New arcs in projective Hjelmslev planes over Galois rings New arcs in projective Hjelmslev planes over Galois rings Michael Kiermaier and Axel Kohnert ABSTRACT. It is known that some good linear codes over a finite ring (R-linear codes) arise from interesting

More information

Unsolved Problems in Graph Theory Arising from the Study of Codes*

Unsolved Problems in Graph Theory Arising from the Study of Codes* Unsolved Problems in Graph Theory Arising from the Study of Codes* N. J. A. Sloane Mathematical Sciences Research Center AT&T Bell Laboratories Murray Hill, NJ 07974 1. Two fundamental questions in coding

More information

Lecture 17: Perfect Codes and Gilbert-Varshamov Bound

Lecture 17: Perfect Codes and Gilbert-Varshamov Bound Lecture 17: Perfect Codes and Gilbert-Varshamov Bound Maximality of Hamming code Lemma Let C be a code with distance 3, then: C 2n n + 1 Codes that meet this bound: Perfect codes Hamming code is a perfect

More information

A Projection Decoding of a Binary Extremal Self-Dual Code of Length 40

A Projection Decoding of a Binary Extremal Self-Dual Code of Length 40 A Projection Decoding of a Binary Extremal Self-Dual Code of Length 4 arxiv:7.48v [cs.it] 6 Jan 27 Jon-Lark Kim Department of Mathematics Sogang University Seoul, 2-742, South Korea jlkim@sogang.ac.kr

More information

Code design: Computer search

Code design: Computer search Code design: Computer search Low rate codes Represent the code by its generator matrix Find one representative for each equivalence class of codes Permutation equivalences? Do NOT try several generator

More information

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land

SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land SIPCom8-1: Information Theory and Coding Linear Binary Codes Ingmar Land Ingmar Land, SIPCom8-1: Information Theory and Coding (2005 Spring) p.1 Overview Basic Concepts of Channel Coding Block Codes I:

More information

Trace Representation of Legendre Sequences

Trace Representation of Legendre Sequences C Designs, Codes and Cryptography, 24, 343 348, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Trace Representation of Legendre Sequences JEONG-HEON KIM School of Electrical and

More information

On Walsh transform and matrix factorization 1

On Walsh transform and matrix factorization 1 Eighth International Workshop on Optimal Codes and Related Topics July 10-14, 2017, Sofia, Bulgaria pp. 55-60 On Walsh transform and matrix factorization 1 Iliya Bouyukliev iliyab@math.bas.bg Paskal Piperkov

More information

Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 1

Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 1 Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 1 Sunghwan Kim, Jong-Seon No School of Electrical Eng. & Com. Sci. Seoul National University, Seoul, Korea Email: {nodoubt, jsno}@snu.ac.kr

More information

Extended 1-perfect additive codes

Extended 1-perfect additive codes Extended 1-perfect additive codes J.Borges, K.T.Phelps, J.Rifà 7/05/2002 Abstract A binary extended 1-perfect code of length n + 1 = 2 t is additive if it is a subgroup of Z α 2 Zβ 4. The punctured code

More information

Efficient Calculation of the Weight. Distributions for Linear Codes over. Large Finite Fields

Efficient Calculation of the Weight. Distributions for Linear Codes over. Large Finite Fields Contemporary Engineering Sciences, Vol. 9, 0, no. 3, 09-7 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/0.988/ces.0.8 Efficient Calculation of the Weight Distributions for Linear Codes over Large Finite

More information

On Binary Cyclic Codes with Codewords of Weight Three and Binary Sequences with the Trinomial Property

On Binary Cyclic Codes with Codewords of Weight Three and Binary Sequences with the Trinomial Property IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 1, JANUARY 2001 421 [4] A. A. Davydov, Constructions and families of covering codes and saturated sets of points in projective geometry, IEEE Trans.

More information

Arrangements, matroids and codes

Arrangements, matroids and codes Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde

More information

Graph-based codes for flash memory

Graph-based codes for flash memory 1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background

More information

MATH3302. Coding and Cryptography. Coding Theory

MATH3302. Coding and Cryptography. Coding Theory MATH3302 Coding and Cryptography Coding Theory 2010 Contents 1 Introduction to coding theory 2 1.1 Introduction.......................................... 2 1.2 Basic definitions and assumptions..............................

More information

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Shu Lin, Shumei Song, Lan Lan, Lingqi Zeng and Ying Y Tai Department of Electrical & Computer Engineering University of California,

More information

On Locating-Dominating Codes in Binary Hamming Spaces

On Locating-Dominating Codes in Binary Hamming Spaces Discrete Mathematics and Theoretical Computer Science 6, 2004, 265 282 On Locating-Dominating Codes in Binary Hamming Spaces Iiro Honkala and Tero Laihonen and Sanna Ranto Department of Mathematics and

More information

Lecture 4: Linear Codes. Copyright G. Caire 88

Lecture 4: Linear Codes. Copyright G. Caire 88 Lecture 4: Linear Codes Copyright G. Caire 88 Linear codes over F q We let X = F q for some prime power q. Most important case: q =2(binary codes). Without loss of generality, we may represent the information

More information

On the Nonexistence of Perfect 2- and 3-Hamming-Error-Correcting Codes over GF(q)

On the Nonexistence of Perfect 2- and 3-Hamming-Error-Correcting Codes over GF(q) INFORMATION AND CONTROL 16, 396-401 (1970) On the Nonexistence of Perfect 2- and 3-Hamming-Error-Correcting Codes over GF(q) J. H. VAN LINT Technological University Eindhoven, Netherlands Received December

More information

Improved Upper Bounds on Sizes of Codes

Improved Upper Bounds on Sizes of Codes 880 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 4, APRIL 2002 Improved Upper Bounds on Sizes of Codes Beniamin Mounits, Tuvi Etzion, Senior Member, IEEE, and Simon Litsyn, Senior Member, IEEE

More information

Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme

Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme P. Delsarte Philips Research Laboratory, Avenue Van Becelaere, 2 B-1170 Brussels, Belgium Y. Desmedt Katholieke Universiteit Leuven, Laboratorium

More information