ON THE RELATIVE GENERALIZED HAMMING WEIGHTS OF A 4-DIMENSIONAL LINEAR CODE AND A SUBCODE WITH DIMENSION ONE
|
|
- Ursula Butler
- 6 years ago
- Views:
Transcription
1 J Syst Sci Complex (2012) 25: ON THE RELATIVE ENERALIZED HAMMIN WEIHTS OF A 4-DIMENSIONAL LINEAR CODE AND A SUBCODE WITH DIMENSION ONE Zihui LIU Wende CHEN DOI: /s Received: 5 August 2010 / Revised: 2 January 2011 c The Editorial Office of JSSC & Springer-Verlag Berlin Heidelberg 2012 Abstract Finite projective geometry method is effectively used to study the relative generalized Hamming weights of 4-dimensional linear codes, which are divided into 9 classes in order to get much more information about the relative generalized Hamming weights, and part of the relative generalized Hamming weights of a 4-dimensional linear code with a 1-dimensional subcode are determined. Key words eneralized Hamming weight, relative difference sequence, relative generalized Hamming weight, support weight. 1 Introduction The relative generalized Hamming weights (RHWs) of a linear code were first introduced in [1] by improving the wire-tap channel of type II with the coset coding scheme invented by Ozarow and Wyner [2], and they generalized the well-known generalized Hamming weights (HWs) [3] to a two-code format. Like HWs, RHWs not only have usage in analyzing the coordinated multiparty wire-tap channel of type II [1], but also bring us much information about the structure of a linear code and its subcodes, so to determine HWs and RHWs is a basic and meaningful work. The HWs of linear codes with small dimensions (for example, dimension = 3, 4, 5) were extensively studied in [4 8]. In parallel with these research work, Ozarow and Wyner [2] determined all the RHWs of a 3-dimensional linear code with its subcodes. Part of the RHWs of a 4-dimensional linear code with its subcodes were determined in [10]. More concisely, in [10], almost all the RHWs of a 4-dimensional linear code with a subcode with dimension greater than one were determined, and for a 4-dimensional linear code with a subcode with dimension one, only the RHWs of the former four classes were studied according to the classification in this paper, and other classes remained unsolved. In this paper, we will study the properties of the RHWs of other classes and determine part of the RHWs. Zihui LIU Department of Mathematics, Beijing Institute of Technology, Beijing , China. lzhui@bit.edu.cn. Wende CHEN Institute of Systems Science, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing , China. This research is supported by the National Natural Science Foundation of China under rant Nos and , and the Special Training Program of Beijing Institute of Technology. This paper was recommended for publication by Editor Xiao-Shan AO.
2 822 ZIHUI LIU WENDE CHEN 2 Finite Projective eometry Methods 2.1 Notations and Definitions Let J be a subset of I = {1, 2,,n}. The subcode C J of a linear [n, k] codec is defined as the set {(c 1,c 2,,c n ) C c t =0fort/ J}. For any subcode D of C, the support of D denoted by χ(d), is defined as the set of positions where not all the codewords of D have zero coordinates. The support weight of D denoted as w S (D) isdefinedasfollows:w S (D) = χ(d). Definition 1 [3] Let C be an [n, k] linear code. The HWs of C are defined as the parameters d r,1 r k, where d r (C) =min{w S (D) D is an [n, r] subcode of C}, 1 r k. In particular, d 1 is the minimum distance of C. Definition 2 [1] Let C be an [n, k] linear code and C 1 be a k 1 -dimensional subcode of C. Then the RHWs of C and C 1 are defined as the parameters M j,1 j k k 1,where Or equivalently, M j = M j (C, C 1 )=min{ J dim(c J ) dim(c 1 J) j}, 1 j k k 1. M j (C, C 1 )=min{ J dim(c J ) dim(c 1 J)=j}, 1 j k k 1. Obviously, if C 1 = {0}, then the HWs of C are retrieved. RHWs are therefore a generalization of HWs. In order to introduce finite geometry methods, we give another version of the definition of RHWs. Definition 3 [9] The RHWs of C and C 1 can also be described as the parameters M j, 1 j k k 1, where M j (C, C 1 )=min{w S (D) D is a subcode of C, dim D = j, D C 1 = {0}} =min{w S (D) D is a subcode of C, dim D dim D C 1 = j}. Definition 4 Assume the RHWs of an [n, k] codec andan[n, k 1 ] subcode C 1 are (M 1,,M k k1 ). Let M 0 = 0, then the relative difference sequence (RDS) of C and C 1 is the sequence (i 0, i 1,, i k k1 ), where i 0 = n M k k1, i j = M k k1 j+1 M k k1 j, 1 j k k 1. Obviously, (i 0, i 1,, i k k1 )and(m 1, M 2,, M k k1, n) can be determined from each other. 2.2 Projective Subspaces and Subcodes We describe projective geometry methods in what follows. Let u =(u 1,u 2,,u k ) F (q) k be a row vector (or the column vector (u 1,u 2,,u k ) T ), and L be a subset of the k coordinate positions of the vector u. Define P L (u) F (q) k such that the t-th component of P L (u) isu t if t L and 0 if t/ L. An example is as follows: Let L = {2, 4} and u =(u 1,u 2,u 3,u 4,u 5 ) F (q) 5 (or the column vector (u 1,u 2,u 3,u 4,u 5 ) T ), then P L (u) = (0,u 2, 0,u 4, 0) (or P L (u) = (0,u 2, 0,u 4, 0) T ). If L = {1, 2}, then P L (u) = (u 1,u 2, 0, 0, 0) (or P L (u) =(u 1,u 2, 0, 0, 0) T ). For a subset U F (q) k, define P L (U) ={P L (u) u U}. Obviously, if U is a subspace of F (q) k,soisp L (U).
3 ON THE RELATIVE ENERALIZED HAMMIN WEIHTS 823 Let A be a generator matrix for a k-dimensional linear code C, thena can naturally determine a correspondence: m: F (q) k Z such that for any u F (q) k, m(u) denotes the number of occurrences of u as a column in A. m(u) is called the value of u. Define the value of a subset U of F (q) k as follows: m(u) = u U m(u). Lemma 1 [10] matrix of C is Let C be an [n, k] code, and C 1 an [n, k 1 ] subcode of C. Assume a generator A = ( Ak1 n A (k k1) n where A k1 n is a generator matrix for C 1. Then there is a one-one correspondence between the set of the j-dimensional subcodes D satisfying D C 1 = {0} and the set of the (k j)- dimensional subspaces U F (q) k satisfying dim(p L (U)) = k 1 such that if D corresponds to U, thenm(u) =n w S (D), where1 j k k 1,andL = {1, 2,,k 1 } represents the first k 1 coordinate positions of the vectors in F (q) k. Let C, C 1,D and A be as in Lemma 1. If y is a column of A, andx = αy for some nonzero α F (q), then we may replace y by x without changing the support weight of the subcode D. Therefore, as in [4] (also see [11]), we may look at the columns of A as the projective points in P(k 1,q). Then m(x) means the number of occurrences of x as a point in P(k 1,q)in the columns of A. Then the correspondence m : F (q) k Z defined before becomes a value function (also called a value assignment [4] ) ), m : P(k 1,q) Z( 0). For any point p P(k 1,q), we call m(p) thevalueofp. Correspondingly, m(u) in Lemma 1 is called the value of the projective subspace U whenever we view the vectors in U as projective points in P(k 1,q). A value function m( ) defines a generator matrix and a code (up to equivalence). Definition 3 tells us that M j (C, C 1 )=min{w S (D) D is a subcode of C, dim D = j, D C 1 = {0}}, 0 j k k 1. We can assume M j (C, C 1 )=w S (D )forsomed satisfying D C 1 = {0}. By Lemma 1, D corresponds to a (k j)-dimensional subspace U F (q) k satisfying dim(p L (U )) = k 1 such that m(u )=n w S (D ). Now, we consider U as a (k j 1)-dimensional projective subspace of P(k 1,q), and still denote it by U.Thendim(P L (U )) = k 1 1. So we can get max{m(u) U P(k 1,q), dim U = k j 1 and dim(p L (U)) = k 1 1} k k 1 j = m(u )=n w S (D )=n M j = i t, where 0 j k k 1. (1) t=0 Summarize finite projective geometry methods as follows: to construct a linear k-dimensional code C and a k 1 -dimensional subcode C 1 with the parameters (M 1, M 2,, M k k1, n), it is necessary to construct a value function m( ) satisfying (1).
4 824 ZIHUI LIU WENDE CHEN 3 On the RHWs of a 4-Dimensional Linear Code C and a 1-Dimensional Subcode C Classification Let E =(1, 0, 0, 0),F =(0, 1, 0, 0), =(0, 0, 1, 0),H =(0, 0, 0, 1) be the basis points of V = P(3,q) in this section (see Figure 1). The projective subspace spanned by two points, e.g., A and B, is called a line, and denoted AB. The projective subspace spanned by three points, e.g., A, B and C, is called a plane, and denoted ÂBC. By Lemma 1, the j-dimensional (1 j 3) subcodes D satisfying D C 1 = {0} are 1-1 corresponding to the (3 j)-dimensional subspaces U P(3,q) satisfying dim(p L (U)) = k 1 1=0,whereL = {1} {1, 2, 3, 4}. Itisafactthatdim(P L (U)) = 0 for L = {1} means U FH. So, the construction of a value function m( ) satisfying (1) is equivalent to that of m( ) such that max{m(p) p is a point of P(3,q)andp/ FH} = i 0, max{m(l) l is a line of P(3,q)andl FH} = i 0 + i 1, max{m( ) is a plane of P(3,q)and FH} = i 0 + i 1 + i 2, m(v )=m(p(3,q)) = i 0 + i 1 + i 2 + i 3. (2) Define MU 0 = {p m(p) =i 0,p is a point and p/ FH}, MU 1 = {l m(l) =i 0 + i 1,l is a line and l FH}, MU 2 = { m( ) =i 0 + i 1 + i 2, is a plane and FH}. We introduce some conditions which may or may not be true. Then according to these conditions we can divide the analysis of the RHWs of a 4-dimensional code and a 1-dimensional subcode into several classes. In such a way, we can obtain much information about the RHWs. (Con1) There exist p MU 0,l MU 1, and P MU 2 such that p l P. (Con2) There exist p MU 0 and l MU 1 such that p l. (Con3) There exist p MU 0 and P MU 2 such that p P. (Con4) There exist l MU 1 and P MU 2 such that l P. According to whether (Con1) (Con4) are true or false, we can divide codes (and value functions) into 9 classes: Class A: Con2, Con3, Con1, Con4 true. Then we call the RDS ARDS. Class B: Con2, Con3 true; Con1, Con4 false. Then we call the RDS BRDS. Class C: Con3, Con4 true; Con1, Con2 false. Then we call the RDS CRDS. Class D: Con2, Con3, Con4 true; Con1 false. Then we call the RDS DRDS. Class E: Con1, Con2, Con4 false, Con3 true. Then we call the RDS ERDS. Class F: Con1, Con3, Con4 false, Con2 true. Then we call the RDS FRDS. Class : Con1, Con3 false; Con2, Con4 true. Then we call the RDS RDS. Class H: Con1, Con2, Con3 false; Con4 true. Then we call the RDS HRDS. Class I: Con1, Con2, Con3, Con4 false. Then we call the RDS IRDS. We have described in [10] the properties of the RHWs of Class A Class D by a group of non-equalities satisfied by their RDS. Conversely, we have showed part of the sequences satisfying these non-equalities are the RHWs of Class A Class D, respectively.
5 ON THE RELATIVE ENERALIZED HAMMIN WEIHTS 825 In this paper, we will give the properties of the RHWs of all other 5 classes of codes and determine part of the RHWs. We also show that the sequences satisfying the upper bound of the non-equalities in Class B and Class D are the RHWs of these two classes, respectively. 3.2 Results about the RHWs Class A: See [10]. Class B: The result of Class B is Theorem 1 If a sequence (i 0,i 1,i 2,i 3 ) is a BRDS, then it must satisfy i 0 1, i 1 2, i 2 qi 1 (q +1), i 3 qi 2 (q +1),i 3 i 1. Conversely, almost all the sequences satisfying the upper bound are BRDSs. E F H Figure 1 The upper bound construction of Class B Proof We have showed a BRDS has the properties listed above in [10]. Conversely, to show almost all the sequences (i 0, i 1, i 2, i 3 ) satisfying the upper bound, that is, satisfying i 2 = qi 1 (q +1)andi 3 = qi 2 (q + 1), are BRDSs, it is necessary to construct a value function m( ) satisfying the conditions in Class B for almost all such sequences. In Figure 1, choose a point on each of the q + 1 lines passing through F in the plane FH and denote them by I 1, I 2,, I q+1, respectively. Let I t / H for 1 t q +1. Thenm( ) can be constructed as follows: i 1, p = F, i 1 1, p H, m(p) = i 1 3, p = I k, where k =1, 2,,q+1, i 1 1, other points in FH, 0, other points in P(3,q). Using this value function, we can check that m(e) =i 0, m(ef) =i 0 + i 1 and m(êh) = i 0 + i 1 + i 2. So E MU 0, EF MU 1 and ÊH MU 2. Using this value function, we can further check all the other conditions in Class B are satisfied. Note that such a value function is meaningful only if i 1 3. So, we can get all the sequences satisfying i 2 = qi 1 (q +1),i 3 = qi 2 (q +1), i 1 3, and i 0 1 are BRDS. Comparing with all the sequences in Theorem 1 satisfying the upper bound, we can see that almost all the sequences satisfying the upper bound are BRDS.
6 826 ZIHUI LIU WENDE CHEN Class C: See [10]. Class D: The result of Class D is Theorem 2 If a sequence (i 0,i 1,i 2,i 3 ) is a DRDS, then i 0 1, i 1 1, i 0 i 2 qi 1 (q +1), i 1 i 3 qi 2 (q +1). Conversely, almost all the sequences (i 0,i 1,i 2,i 3 ) satisfying the upper bound are DRDSs. E F I H Figure 2 The upper bound construction for Class D. Proof See [10] for the proof of the properties satisfied by DRDSs. It is still necessary to give the upper bound construction of m( ). Denote the points on the line H in Figure 2 by 0 =, 1,, γ,, q 1, q = H, and the points on the line HF by H 0 = H, H 1,, H γ,, H q 1, H q = F. Assume F i H i = O i for 1 i q 1. Choose a point on the line F and denote it by K. Suppose E i I = J i for 1 i q and i 0 +1=qα + β. Then we can get the upper bound construction m( ) whenever i 0 2q q 1 and i 1 3. i 1, p = F, i 1 1, p =, α +1, p = J i, 1 i β, α, other points on I\{}, i 1 1 α 1, p = i, 1 i β, m(p) = i 1 1 α, other points on H\{}, i 1 3, p = O i, 1 i q 1, i 1 3, p = H 1, i 1 3, p = K, i 1 1, other points in FH, 0, other points in P(3,q). We can show that m(eh) =i 0 + i 1 + i 2 and m(i) =i 0 + i 1, and other conditions stated in Class D can be checked one by one. So m( ) satisfies our demands. In the following upper bound constructions, we need Lemma 2 If there exist a point p MU 0 andalinel MU 1 such that p/ l then i 0 qi 1 ; If Con2 false, then i 0 qi 1 (q +1).
7 ON THE RELATIVE ENERALIZED HAMMIN WEIHTS 827 Proof Assume i 0 >qi 1,thenm(l) =i 0 + i 1 > (q +1)i 1,sothereexistsapointp l such that m(p ) >i 1,thenm(pp 0 ) >i 0 + i 1, a contradiction to (2). Similar arguments show that if Con2 false, then i 0 qi 1 (q +1). Class E: The result of Class E is Theorem 3 If a sequence (i 0,i 1,i 2,i 3 ) is an ERDS, then it must satisfy { i0 +1 i 2 qi 1 (q +1), i 0 +1 i 3 qi 2 (q +1). Conversely, almost all the sequences satisfying the upper bound are ERDSs. Proof If a sequence (i 0,i 1,i 2,i 3 ) is an ERDS, then there exist a point p MU 0 and a plane MU 2 such that p, but any line in passing through the point p has the value at most i 0 + i 1 1, so i 0 + i 1 + i 2 = m( ) (q +1)(i 0 + i 1 1) qi 0,thatis,i 2 qi 1 (q + 1). Further, any plane in P(3,q) passing through a fixed line l MU 1 has a value at most i 0 + i 1 + i 2 1, so i 0 + i 1 + i 2 + i 3 = m(p(3,q)) (q +1)(i 0 + i 1 + i 2 1) q(i 0 + i 1 ), that is, i 3 qi 2 (q +1). Assume p 0 = l,thenm(p 0 ) i 1 1sincem(pp 0 ) i 0 + i 1 1. Since m(p(3,q)\ ) = i 3 m(l\p 0 ), we get that i 0 +1 i 3. Further, the plane passing through the point p and the line l has a value at most i 0 + i 1 + i 2 1, so m(p)+m(l) =i 0 +(i 0 + i 1 ) i 0 + i 1 + i 2 1, that is, i 0 +1 i 2. Conversely (see Figure 3), assume i 0 +1=qα + β and ĜIJ FH = L, wherel FH and 0 β q 1. Denote the q points on the line I\{} by 1, 2,, q 1, q = I, respectively. Suppose E i H = O i for 1 i q, whereo q = H. Then the upper bound construction is given as follows: m(p) = i 1 3, p = F, i 1 1, other points on the line F 2, p = J α +1, p = i for 1 i β α, other points on the line I\{} i 1 2 α, p = O i for 1 i β i 1 1 α, other points on the line H\{, H} i 1 1, points on the plane FH i 1 5, p = L i 1 2 α, p = H = O q i 1 3, p FH\{F, H, L} 0, other points in P(3,q). We first note that i 1 α = i 1 i0+1 q > 0 by Lemma 2, so we can make m(p) 0 for all the points p P(3,q)onlyifi 1 is large enough. So the value function m( ) is meaningful. In addition, we can check that I MU 1, ÊF MU 2 and other details so that m( ) satisfies our demands.
8 828 ZIHUI LIU WENDE CHEN E J F I H L Figure 3 The upper bound construction for Class E Class F: The result of Class F is Theorem 4 If a sequence (i 0,i 1,i 2,i 3 ) is an FRDS, then it must satisfy { i2 qi (I) 1 +1 i 0 i 3 qi 2 (q +1) or (II) qi 1 +1 i 2 i 0 i 3 qi 2 (q +1) i 2 + i 3 (q 2 + q)i 1, conversely, almost all the sequences satisfying the upper bound in (I) are FRDSs. Proof The proof of i 0 i 3 qi 2 (q + 1) is similar to Class E, and the details are omitted. Since any plane passing through a fixed point p MU 0 has the value at most i 0 + i 1 + i 2 1 or i 0 +(q +1)i 1,wegetthati 2 qi 1 +1ifi 0 + i 1 + i 2 1 i 0 +(q +1)i 1 or i 2 qi 1 +1if i 0 +(q +1)i 1 i 0 + i 1 + i 2 1. There are altogether (q 2 + q + 1) lines passing through the point p in P(3,q), so i 0 + i 1 + i 2 + i 3 = m(p(3,q)) i 0 +(q 2 + q +1)i 1,soi 2 + i 3 (q 2 + q)i 1. Note that i 2 + i 3 (q 2 + q)i 1 is not necessary in (I) since we can get it from (I) itself. E F I H Figure 4 the upper bound construction for Class F (I) Conversely (see Figure 4), assume i 0 +1 = q 2 ζ +(q +1)η +σ, where0 η q 1, 0 σ q and σ =0ifη = q 1. Denote the points on the line Fby F 0 = F, F 1,, F q =, and denote the q 1 points on the line IF i \{I,F i } by ξ i1, ξ i2,, ξ iq 1 for 0 i q. LetQ represent an arbitrary point in FH\F, and suppose EQ FI = E Q. Then we can construct a desired
9 ON THE RELATIVE ENERALIZED HAMMIN WEIHTS 829 upper bound value function as follows. m(p) = i 1, p F, ζ +1, p = ξ i1,ξ i2,ξ iη+1 for 0 i, σ 1, ζ +1, p = ξ i1,ξ i2,ξ iη for σ i q, ζ, the other points in FI\F, i 1 m(e Q ), p = Q FH\F, 0, the other points in P(3,q). Using this value function, we can get all the sequences satisfying the upper bound in (I) are FRDSs only if i 0 >q+1. Class : The result of Class is Theorem 5 If a sequence (i 0,i 1,i 2,i 3 ) is a RDS, then it must satisfy (I) { i0 +1 i 2 qi 1 +1, i 0 i 3 qi 2 (q +1), or (II) { max{i0 +1,qi 1 +1} i 2, i 2 + i 3 (q 2 + q)i 1, conversely, almost all the sequences satisfying the upper bound of (I) are RDSs. E J F I H Figure 5 The upper bound construction for Class (I) Proof Similarly as before, we only give an upper bound value function, the details are omitted (see Figure 5). Assume i 0 = qα + β and choose a point J IF\{I,F}. Suppose EJ FH = K. If a sequence is a RDS, then there exist a point p MU 0, two lines l 1 MU 1, l 2 MU 1 and a plane MU 2 such that p l 1, l 2 but p / l 2. So i 1 i0 q = α by Lemma 2. Denote the q points on I\{} by I 0 = I, I 1,, I q 1. Suppose EI k H = H k,where0 k q 1andH 0 = H. Then we can give an upper bound value function as follows: 1, p = J, α +1, p = I k for 0 k β 1, α, the other points of I\{}, m(p) = i 1 α 1, p = H k for 0 k β 1, i 1 α, the other points of H\{}, i 1 1, p = K, i 1, the other points in FH, 0, the other points in P(3,q).
10 830 ZIHUI LIU WENDE CHEN Class H: The result of Class H is Theorem 6 If a sequence (i 0,i 1,i 2,i 3 ) is an HRDS, then it must satisfy i 0 +1 i 2 qi 1 q, max{i 0 +1,qi 1 q} i 2, (I) i 2 + i 3 (q 2 + q)i 1 (q 2 + q +1), or (II) i 2 + i 3 (q 2 + q)i 1 (q 2 + q +1), i 0 i 3, i 0 i 3, conversely, almost all the sequences satisfying the upper bound of (I) are HRDSs (see Figure 6). E F I H Figure 6 The upper bound construction for Class H (I) Proof Still denote the q points on I\{} by I 0 = I, I 1,, I q 1. Suppose EI k H = H k,where0 k q 1andH 0 = H. Assume i 0 +1 = qα + β, then we can get i 1 > i0+1 q = α again from Lemma 2. So an upper bound value function below is meaningful: m(p) = α +1, p = I k for 0 k β 1, α, p = I k for β k q 1, i 1 2 α, p = H k for 0 k β 1, i 1 1 α, p = H k for β k q 1, i 1 1, the other points in FH, 0, the other points in P(3,q). It can be checked similarly that this value function satisfies our demands only if i 0 is large enough, that is, i 0 >f(q), where f(q) is a function of q. Class I: The result of Class I is Theorem 7 If a sequence (i 0,i 1,i 2,i 3 ) is an IRDS, then it must satisfy { i0 +1 i (I) 2 qi 1 q, 2i 0 +1 i 3 qi 2 (q +1), or (II) max{i 0 +1,qi 1 q} i 2, 2i 0 +1 i 3 qi 2 (q +1), i 2 + i 3 (q 2 + q)i 1 (q 2 + q +1), conversely, almost all the sequences satisfying the upper bound of (I) are HRDSs (see Figure 7). Proof Assume i 0 +1 = qα+β and α =(q 1)ξ +γ, where0 β q 1 and0 γ q 2, then i 0 +2=q(q 1)ξ + qγ + β + 1. Choose the points I,J EH\{E,H}. Denotetheq +1 points on the line FH by F 1 = F, F 2,, F q+1 = H. Denote the q points on H\{} by H 1 = H, H 2,, H q. Assume ĜJF 2 EF = K and EH k J = J k for 1 k q. LetQ be an arbitrary point in ĜIF \{I F }, andeq ĜF H = E Q.ThenE Q ĜHF \{H F }.
11 ON THE RELATIVE ENERALIZED HAMMIN WEIHTS 831 E K F I H J Figure 7 The upper bound construction for Class I (I) We first assign to qγ + β + 1 points among ĜIF \{I F } each the value ξ + 1, and to the other points in ĜIF \{I F } each the value ξ. Then we can give m(p) = 1, p = K, i 1 2, p = F, i 1 1, p F\F, α +1, p = J k for 1 k β, α, p = J k for β k q, i 1 2 α, p = H k for 1 k β, i 1 1 α, p = H k for β k q, i 1 3 m(q), p = E Q = F 2, i 1 2 m(q), p = E Q = F k for 3 k q, i 1 1 m(q), p = E Q, ĜHF \{H F FH}, 0, the other points in P(3,q). Using this value function, we can similarly show that all the upper bound sequences are IRDSs only if i 0 is large enough, that is, i 0 h(q), where h(q) is a function of q. 4 Conclusion Finite geometry methods are effective tools to study RHWs. In this paper, we classify the codes with dimension 4 into 9 classes, and then use finite geometry methods to study the properties of the RHWs of each class and determine part of the RHWs of each class. We have shown almost all the sequences satisfying the upper bound of each class are the corresponding RHWs. Acknowledgements The authors wish to thank the editor and the referees for their comments and suggestions that helped to improve this paper. References [1] Y. Luo, C. Mitrpant, A. J. Han Vinck, and K. F. Chen, Some new characters on the wire-tap channel of type II, IEEE Trans. Inform. Theory, 2005, 51(3):
12 832 ZIHUI LIU WENDE CHEN [2] L. H. Ozarow and A. D. Wyner, Wire-tap channel II, AT&T Bell Laboratories Technical Journal, 1984, 63(10): [3] V. K. Wei, eneralized Hamming weight for linear codes, IEEE Trans. Inform. Theory, 1991, 37(5): [4] W. D. Chen and T. Kløve, The weight hierarchies of q-ary codes of dimension 4, IEEE Trans. Inform. Theory, 1996, 42(6): [5] T. Helleseth, T. Kløve and Ø. Ytrehus, eneralized Hamming weights of linear codes, IEEE Trans. Inform. Theory, 1992, 38(3): [6] W. D. Chen and T. Kløve, Weight hierarchies of extremal non-chain binary codes of dimension 4, IEEE Trans. Inform. Theory, 1999, 45(1): [7] W. D. Chen and T. Kløve, Weight hierarchies of linear codes of dimension 3, J. Statist. Plann. Inference, 2001, 94(2): [8] W. D. Chen and T. Kløve, Finite projective geometries and classification of the weight hierarchies of codes (I), Acta Mathematica Sinica, English Series, 2004, 20(2): [9] Z. H. Liu, W. D. Chen and X. W. Wu, On the relative generalized Hamming weights of linear codes and their subcodes, SIAM Journal on Discrete Mathematics, 2010, 24(4): [10] Z. H. Liu, W. D. Chen, and Y. Luo, The relative generalized Hamming weight of linear q-ary codes and their subcodes, Des. Codes Cryptogr., 2008, 48(2): [11] M. A. Tsfasman and S. Vladuts, eometric approach to higher weights, IEEE Trans. Inform. Theory, 1995, 41(6):
On the second greedy weight for linear codes ofdimension 3
Discrete Mathematics 241 (2001) 171 187 www.elsevier.com/locate/disc On the second greedy weight for linear codes ofdimension 3 Wende Chen a, Torleiv KlHve b; a System and Control Laboratory, Institute
More informationFlags of almost ane codes
Flags of almost ane codes Trygve Johnsen Hugues Verdure April 0, 207 Abstract We describe a two-party wire-tap channel of type II in the framework of almost ane codes. Its cryptological performance is
More informationMatrix characterization of linear codes with arbitrary Hamming weight hierarchy
Linear Algebra and its Applications 412 (2006) 396 407 www.elsevier.com/locate/laa Matrix characterization of linear codes with arbitrary Hamming weight hierarchy G. Viswanath, B. Sundar Rajan Department
More informationActa Mathematica Sinica, English Series Springer-Verlag Berlin Heidelberg & The Editorial Office of AMS 2015
Acta Mathematica Sinica, English Series Jul., 2015, Vol. 31, No. 7, pp. 1163 1170 Published online: June 15, 2015 DOI: 10.1007/s10114-015-3616-y Http://www.ActaMath.com Acta Mathematica Sinica, English
More informationRefined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth s second tower
Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth s second tower arxiv:5.0630v [cs.it] 9 Nov 05 Olav Geil, Stefano Martin, Umberto Martínez-Peñas, Diego Ruano Abstract Asymptotically
More informationCode constructions and existence bounds for relative generalized Hamming weight
Des. Codes Cryptogr. 2013) 69:275 297 DOI 10.1007/s10623-012-9657-7 Code constructions and existence bounds for relative generalized Hamming weight Zhuojun Zhuang Yuan Luo Bin Dai Received: 28 November
More informationAll Good (Bad) Words Consisting of 5 Blocks
Acta Mathematica Sinica, English Series Jun, 2017, Vol 33, No 6, pp 851 860 Published online: January 25, 2017 DOI: 101007/s10114-017-6134-2 Http://wwwActaMathcom Acta Mathematica Sinica, English Series
More informationSupport weight enumerators and coset weight distributions of isodual codes
Support weight enumerators and coset weight distributions of isodual codes Olgica Milenkovic Department of Electrical and Computer Engineering University of Colorado, Boulder March 31, 2003 Abstract In
More informationPlotkin s Bound in Codes Equipped with the Euclidean Weight Function
Tamsui Oxford Journal of Mathematical Sciences 5() (009) 07-4 Aletheia University Plotkin s Bound in Codes Equipped with the Euclidean Weight Function Sapna Jain Department of Mathematics, University of
More informationMATH/MTHE 406 Homework Assignment 2 due date: October 17, 2016
MATH/MTHE 406 Homework Assignment 2 due date: October 17, 2016 Notation: We will use the notations x 1 x 2 x n and also (x 1, x 2,, x n ) to denote a vector x F n where F is a finite field. 1. [20=6+5+9]
More informationSome New Optimal Ternary Linear Codes
Designs, Codes and Cryptography, 12, 5 11 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Some New Optimal Ternary Linear Codes ILIYA BOUKLIEV* Institute of Mathematics,
More informationNeighbor Sum Distinguishing Total Colorings of Triangle Free Planar Graphs
Acta Mathematica Sinica, English Series Feb., 2015, Vol. 31, No. 2, pp. 216 224 Published online: January 15, 2015 DOI: 10.1007/s10114-015-4114-y Http://www.ActaMath.com Acta Mathematica Sinica, English
More informationMaximal perpendicularity in certain Abelian groups
Acta Univ. Sapientiae, Mathematica, 9, 1 (2017) 235 247 DOI: 10.1515/ausm-2017-0016 Maximal perpendicularity in certain Abelian groups Mika Mattila Department of Mathematics, Tampere University of Technology,
More informationELA
POSITIVE DEFINITE SOLUTION OF THE MATRIX EQUATION X = Q+A H (I X C) δ A GUOZHU YAO, ANPING LIAO, AND XUEFENG DUAN Abstract. We consider the nonlinear matrix equation X = Q+A H (I X C) δ A (0 < δ 1), where
More informationMTH5102 Spring 2017 HW Assignment 3: Sec. 1.5, #2(e), 9, 15, 20; Sec. 1.6, #7, 13, 29 The due date for this assignment is 2/01/17.
MTH5102 Spring 2017 HW Assignment 3: Sec. 1.5, #2(e), 9, 15, 20; Sec. 1.6, #7, 13, 29 The due date for this assignment is 2/01/17. Sec. 1.5, #2(e). Determine whether the following sets are linearly dependent
More informationGeneralized weights and bounds for error probability over erasure channels
Generalized weights and bounds for error probability over erasure channels Leandro Cruvinel Lemes Department of Electrical Engineering Federal University of Triangulo Mineiro Uberaba - MG, Brazil Email:
More informationSOME DESIGNS AND CODES FROM L 2 (q) Communicated by Alireza Abdollahi
Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 3 No. 1 (2014), pp. 15-28. c 2014 University of Isfahan www.combinatorics.ir www.ui.ac.ir SOME DESIGNS AND CODES FROM
More informationEfficient Decoding of Permutation Codes Obtained from Distance Preserving Maps
2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical
More informationConstructions of digital nets using global function fields
ACTA ARITHMETICA 105.3 (2002) Constructions of digital nets using global function fields by Harald Niederreiter (Singapore) and Ferruh Özbudak (Ankara) 1. Introduction. The theory of (t, m, s)-nets and
More informationFIXED POINTS OF MEROMORPHIC SOLUTIONS OF HIGHER ORDER LINEAR DIFFERENTIAL EQUATIONS
Annales Academiæ Scientiarum Fennicæ Mathematica Volumen 3, 2006, 9 2 FIXED POINTS OF MEROMORPHIC SOLUTIONS OF HIGHER ORDER LINEAR DIFFERENTIAL EQUATIONS Liu Ming-Sheng and Zhang Xiao-Mei South China Normal
More informationL p Approximation of Sigma Pi Neural Networks
IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 11, NO. 6, NOVEMBER 2000 1485 L p Approximation of Sigma Pi Neural Networks Yue-hu Luo and Shi-yi Shen Abstract A feedforward Sigma Pi neural networks with a
More informationElementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q),
Elementary 2-Group Character Codes Cunsheng Ding 1, David Kohel 2, and San Ling Abstract In this correspondence we describe a class of codes over GF (q), where q is a power of an odd prime. These codes
More informationLIFTED CODES OVER FINITE CHAIN RINGS
Math. J. Okayama Univ. 53 (2011), 39 53 LIFTED CODES OVER FINITE CHAIN RINGS Steven T. Dougherty, Hongwei Liu and Young Ho Park Abstract. In this paper, we study lifted codes over finite chain rings. We
More informationOn the k-error linear complexity for p n -periodic binary sequences via hypercube theory
1 On the k-error linear complexity for p n -periodic binary sequences via hypercube theory Jianqin Zhou Department of Computing, Curtin University, Perth, WA 6102 Australia Computer Science School, Anhui
More informationThere are no Barker arrays having more than two dimensions
There are no Barker arrays having more than two dimensions Jonathan Jedwab Matthew G. Parker 5 June 2006 (revised 7 December 2006) Abstract Davis, Jedwab and Smith recently proved that there are no 2-dimensional
More informationUncertain Entailment and Modus Ponens in the Framework of Uncertain Logic
Journal of Uncertain Systems Vol.3, No.4, pp.243-251, 2009 Online at: www.jus.org.uk Uncertain Entailment and Modus Ponens in the Framework of Uncertain Logic Baoding Liu Uncertainty Theory Laboratory
More informationDuality for poset codes
Allan O. Moura Marcelo Firer State University of Campinas Fq9 - UCD, July 13-17 2009 Outline 1 Basic definitions 2 3 Outline Basic Definitions 1 Basic definitions 2 3 Notation Basic Definitions [n] = {1,2,...,n}
More informationVector spaces. EE 387, Notes 8, Handout #12
Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is
More informationHigher weight distribution of Linearized Reed-Solomon codes
Higher weight distribution of Linearized Reed-Solomon codes Haode Yan, Yan Liu, Chunlei Liu arxiv:1505.0778v1 [cs.it] 7 May 015 Abstract Let m, d and be ositive integers such that m e, where e = (m,d).
More informationNew Constructions of Permutation Arrays
JOURNAL OF LATEX CLASS FILES, VOL. 1, NO. 11, AUGUST 2006 1 New Constructions of Permutation Arrays Lizhen Yang, Kefei Chen, Luo Yuan arxiv:0801.3987v1 [cs.it] 25 Jan 2008 Abstract A permutation array(permutation
More informationLET be the finite field of cardinality and let
128 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 43, NO. 1, JANUARY 1997 An Explicit Construction of a Sequence of Codes Attaining the Tsfasman Vlăduţ Zink Bound The First Steps Conny Voss Tom Høholdt,
More informationSecret-sharing with a class of ternary codes
Theoretical Computer Science 246 (2000) 285 298 www.elsevier.com/locate/tcs Note Secret-sharing with a class of ternary codes Cunsheng Ding a, David R Kohel b, San Ling c; a Department of Computer Science,
More informationA NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1
BULLETIN (New Series) OF THE AMERICAN MATHEMATICAL SOCIETY Volume 23, Number 2, October 1990 A NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1 J. H. CONWAY AND N. J. A. SLOANE ABSTRACT.
More informationOn non-antipodal binary completely regular codes
On non-antipodal binary completely regular codes J. Borges, J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, 08193-Bellaterra, Spain. V.A. Zinoviev Institute
More informationSome Extremal Self-Dual Codes and Unimodular Lattices in Dimension 40
Some Extremal Self-Dual Codes and Unimodular Lattices in Dimension 40 Stefka Bouyuklieva, Iliya Bouyukliev and Masaaki Harada October 17, 2012 Abstract In this paper, binary extremal singly even self-dual
More informationThe super connectivity of shuffle-cubes
Information Processing Letters 96 (2005) 123 127 www.elsevier.com/locate/ipl The super connectivity of shuffle-cubes Jun-Ming Xu a,,minxu b, Qiang Zhu c a Department of Mathematics, University of Science
More informationBlow-up of solutions for the sixth-order thin film equation with positive initial energy
PRAMANA c Indian Academy of Sciences Vol. 85, No. 4 journal of October 05 physics pp. 577 58 Blow-up of solutions for the sixth-order thin film equation with positive initial energy WENJUN LIU and KEWANG
More informationA class of mixed orthogonal arrays obtained from projection matrix inequalities
Pang et al Journal of Inequalities and Applications 2015 2015:241 DOI 101186/s13660-015-0765-6 R E S E A R C H Open Access A class of mixed orthogonal arrays obtained from projection matrix inequalities
More informationSecret Sharing Schemes from a Class of Linear Codes over Finite Chain Ring
Journal of Computational Information Systems 9: 7 (2013) 2777 2784 Available at http://www.jofcis.com Secret Sharing Schemes from a Class of Linear Codes over Finite Chain Ring Jianzhang CHEN, Yuanyuan
More informationWe showed that adding a vector to a basis produces a linearly dependent set of vectors; more is true.
Dimension We showed that adding a vector to a basis produces a linearly dependent set of vectors; more is true. Lemma If a vector space V has a basis B containing n vectors, then any set containing more
More informationON PERTURBATION OF BINARY LINEAR CODES. PANKAJ K. DAS and LALIT K. VASHISHT
Math Appl 4 (2015), 91 99 DOI: 1013164/ma201507 ON PERTURBATION OF BINARY LINEAR CODES PANKAJ K DAS and LALIT K VASHISHT Abstract We present new codes by perturbation of rows of the generating matrix of
More informationAN EQUIVALENCY CONDITION OF NONSINGULARITY IN NONLINEAR SEMIDEFINITE PROGRAMMING
J Syst Sci Complex (2010) 23: 822 829 AN EQUVALENCY CONDTON OF NONSNGULARTY N NONLNEAR SEMDEFNTE PROGRAMMNG Chengjin L Wenyu SUN Raimundo J. B. de SAMPAO DO: 10.1007/s11424-010-8057-1 Received: 2 February
More informationCONSTRUCTION OF SLICED ORTHOGONAL LATIN HYPERCUBE DESIGNS
Statistica Sinica 23 (2013), 1117-1130 doi:http://dx.doi.org/10.5705/ss.2012.037 CONSTRUCTION OF SLICED ORTHOGONAL LATIN HYPERCUBE DESIGNS Jian-Feng Yang, C. Devon Lin, Peter Z. G. Qian and Dennis K. J.
More informationPermutation decoding for the binary codes from triangular graphs
Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for
More informationBinary construction of quantum codes of minimum distances five and six
Discrete Mathematics 308 2008) 1603 1611 www.elsevier.com/locate/disc Binary construction of quantum codes of minimum distances five and six Ruihu Li a, ueliang Li b a Department of Applied Mathematics
More informationComplete Moment Convergence for Weighted Sums of Negatively Orthant Dependent Random Variables
Filomat 31:5 217, 1195 126 DOI 1.2298/FIL175195W Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Complete Moment Convergence for
More informationarxiv: v1 [math.ra] 11 Aug 2014
Double B-tensors and quasi-double B-tensors Chaoqian Li, Yaotang Li arxiv:1408.2299v1 [math.ra] 11 Aug 2014 a School of Mathematics and Statistics, Yunnan University, Kunming, Yunnan, P. R. China 650091
More informationarxiv: v2 [cs.it] 12 Jul 2018
MDS codes with arbitrary dimensional hull and their applications Gaojun Luo 1, Xiwang Cao 1, arxiv:1807.03166v [cs.it] 1 Jul 018 Friday 13 th July, 018 Abstract The hull of linear codes have promising
More informationOn Two Probabilistic Decoding Algorithms for Binary Linear Codes
On Two Probabilistic Decoding Algorithms for Binary Linear Codes Miodrag Živković Abstract A generalization of Sullivan inequality on the ratio of the probability of a linear code to that of any of its
More informationMathematics Department
Mathematics Department Matthew Pressland Room 7.355 V57 WT 27/8 Advanced Higher Mathematics for INFOTECH Exercise Sheet 2. Let C F 6 3 be the linear code defined by the generator matrix G = 2 2 (a) Find
More informationNon-separating 2-factors of an even-regular graph
Discrete Mathematics 308 008) 5538 5547 www.elsevier.com/locate/disc Non-separating -factors of an even-regular graph Yusuke Higuchi a Yui Nomura b a Mathematics Laboratories College of Arts and Sciences
More informationResearch Article A Two-Grid Method for Finite Element Solutions of Nonlinear Parabolic Equations
Abstract and Applied Analysis Volume 212, Article ID 391918, 11 pages doi:1.1155/212/391918 Research Article A Two-Grid Method for Finite Element Solutions of Nonlinear Parabolic Equations Chuanjun Chen
More informationON EXPONENTIAL DIVISORS
ON EXPONENTIAL DIVISORS E. G. STRAUS AND M. V. SUBBARAO Let ()(N) denote the sum of the exponential divisors of N, that is, divisors of the form pl b... pbr, b. a, 1, r, when N has the cnonical form pla...,
More informationarxiv: v1 [math.co] 27 Jul 2015
Perfect Graeco-Latin balanced incomplete block designs and related designs arxiv:1507.07336v1 [math.co] 27 Jul 2015 Sunanda Bagchi Theoretical Statistics and Mathematics Unit Indian Statistical Institute
More informationMatrix expression and reachability analysis of finite automata
J Control Theory Appl 2012 10 (2) 210 21 DOI 101007/s11768-012-1178-4 Matrix expression and reachability analysis of finite automata Xiangru XU, Yiguang HONG Key Laboratory of Systems and Control, Academy
More informationCodewords of small weight in the (dual) code of points and k-spaces of P G(n, q)
Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q) M. Lavrauw L. Storme G. Van de Voorde October 4, 2007 Abstract In this paper, we study the p-ary linear code C k (n, q),
More informationPossible numbers of ones in 0 1 matrices with a given rank
Linear and Multilinear Algebra, Vol, No, 00, Possible numbers of ones in 0 1 matrices with a given rank QI HU, YAQIN LI and XINGZHI ZHAN* Department of Mathematics, East China Normal University, Shanghai
More informationOpen Questions in Coding Theory
Open Questions in Coding Theory Steven T. Dougherty July 4, 2013 Open Questions The following questions were posed by: S.T. Dougherty J.L. Kim P. Solé J. Wood Hilbert Style Problems Hilbert Style Problems
More informationNew binary self-dual codes of lengths 50 to 60
Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) New binary self-dual codes of lengths 50 to 60 Nikolay Yankov Moon Ho Lee Received: date / Accepted: date Abstract Using
More informationOn the simplest expression of the perturbed Moore Penrose metric generalized inverse
Annals of the University of Bucharest (mathematical series) 4 (LXII) (2013), 433 446 On the simplest expression of the perturbed Moore Penrose metric generalized inverse Jianbing Cao and Yifeng Xue Communicated
More informationOn the floor and the ceiling of a divisor
Finite Fields and Their Applications 12 (2006) 38 55 http://www.elsevier.com/locate/ffa On the floor and the ceiling of a divisor Hiren Maharaj, Gretchen L. Matthews 1 Department of Mathematical Sciences,
More informationFormally self-dual additive codes over F 4
Formally self-dual additive codes over F Sunghyu Han School of Liberal Arts, Korea University of Technology and Education, Cheonan 0-708, South Korea Jon-Lark Kim Department of Mathematics, University
More information2.4 Root space decomposition
34 CHAPTER 2. SEMISIMPLE LIE ALGEBRAS 2.4 Root space decomposition Let L denote a semisimple Lie algebra in this section. We will study the detailed structure of L through its adjoint representation. 2.4.1
More informationORTHOGONAL ARRAYS CONSTRUCTED BY GENERALIZED KRONECKER PRODUCT
Journal of Applied Analysis and Computation Volume 7, Number 2, May 2017, 728 744 Website:http://jaac-online.com/ DOI:10.11948/2017046 ORTHOGONAL ARRAYS CONSTRUCTED BY GENERALIZED KRONECKER PRODUCT Chun
More informationSome results concerning global avalanche characteristics of two q-ary functions
Some results concerning global avalanche characteristics of two -ary functions Brajesh Kumar Singh Department of Mathematics, School of Allied Sciences, Graphic Era Hill University, Dehradun-4800 (Uttarakhand)
More informationA construction of optimal sets of FH sequences
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 50 2011, Pages 37 44 A construction of optimal sets of FH sequences Bin Wen Department of Mathematics Changshu Institute of Technology Changshu 215500, Jiangsu
More informationBurst Error Enumeration of m-array Codes over Rings and Its Applications
EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 3 No. 4 2010 653-669 ISSN 1307-5543 www.epam.com Burst Error Enumeration of m-array Codes over Rings and Its Applications İrfan Şiap Department of
More informationA New Class of Refined Eulerian Polynomials
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018), Article 18.5.5 A New Class of Refined Eulerian Polynomials Hua Sun College of Sciences Dalian Ocean University Dalian 116023 PR China sunhua@dlou.edu.cn
More informationNew Inequalities for q-ary Constant-Weight Codes
New Inequalities for q-ary Constant-Weight Codes Hyun Kwang Kim 1 Phan Thanh Toan 1 1 Department of Mathematics, POSTECH International Workshop on Coding and Cryptography April 15-19, 2013, Bergen (Norway
More informationCryptanalysis of the Wu}Dawson Public Key Cryptosystem
Finite Fields and Their Applications 5, 386}392 (1999) Article ID!ta.1999.0264, available online at http://www.idealibrary.com on Cryptanalysis of the Wu}Dawson Public Key Cryptosystem Peter Roelse Philips
More informationYimin Wei a,b,,1, Xiezhang Li c,2, Fanbin Bu d, Fuzhen Zhang e. Abstract
Linear Algebra and its Applications 49 (006) 765 77 wwwelseviercom/locate/laa Relative perturbation bounds for the eigenvalues of diagonalizable and singular matrices Application of perturbation theory
More informationON THE BETTI NUMBERS OF FILIFORM LIE ALGEBRAS OVER FIELDS OF CHARACTERISTIC TWO
REVISTA DE LA UNIÓN MATEMÁTICA ARGENTINA Vol. 58, No. 1, 2017, Pages 95 106 Published online: February 9, 2017 ON THE BETTI NUMBERS OF FILIFORM LIE ALGEBRAS OVER FIELDS OF CHARACTERISTIC TWO IOANNIS TSARTSAFLIS
More informationPeriodicity and Distribution Properties of Combined FCSR Sequences
Periodicity and Distribution Properties of Combined FCSR Sequences Mark Goresky 1, and Andrew Klapper, 1 Institute for Advanced Study, Princeton NJ www.math.ias.edu/~goresky Dept. of Computer Science,
More informationUncertain Satisfiability and Uncertain Entailment
Uncertain Satisfiability and Uncertain Entailment Zhuo Wang, Xiang Li Department of Mathematical Sciences, Tsinghua University, Beijing, 100084, China zwang0518@sohu.com, xiang-li04@mail.tsinghua.edu.cn
More informationFast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function
Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Yindong Chen a,, Fei Guo a, Liu Zhang a a College of Engineering, Shantou University, Shantou 515063, China Abstract Boolean functions
More informationA class of error-correcting pooling designs over complexes
DOI 10.1007/s10878-008-9179-4 A class of error-correcting pooling designs over complexes Tayuan Huang Kaishun Wang Chih-Wen Weng Springer Science+Business Media, LLC 008 Abstract As a generalization of
More informationComments and Corrections
1386 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 59, NO 5, MAY 2014 Comments and Corrections Corrections to Stochastic Barbalat s Lemma and Its Applications Xin Yu and Zhaojing Wu Abstract The proof of
More informationNew Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting
New Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting Hideki Yagi 1, Toshiyasu Matsushima 2, and Shigeichi Hirasawa 2 1 Media Network Center, Waseda University 1-6-1,
More informationNON-MONOTONICITY HEIGHT OF PM FUNCTIONS ON INTERVAL. 1. Introduction
Acta Math. Univ. Comenianae Vol. LXXXVI, 2 (2017), pp. 287 297 287 NON-MONOTONICITY HEIGHT OF PM FUNCTIONS ON INTERVAL PINGPING ZHANG Abstract. Using the piecewise monotone property, we give a full description
More informationCharacterizations on Heavy-tailed Distributions by Means of Hazard Rate
Acta Mathematicae Applicatae Sinica, English Series Vol. 19, No. 1 (23) 135 142 Characterizations on Heavy-tailed Distributions by Means of Hazard Rate Chun Su 1, Qi-he Tang 2 1 Department of Statistics
More informationHouston Journal of Mathematics. c 2008 University of Houston Volume 34, No. 4, 2008
Houston Journal of Mathematics c 2008 University of Houston Volume 34, No. 4, 2008 SHARING SET AND NORMAL FAMILIES OF ENTIRE FUNCTIONS AND THEIR DERIVATIVES FENG LÜ AND JUNFENG XU Communicated by Min Ru
More informationA shortening of C on the coordinate i is the [n 1, k 1, d] linear code obtained by leaving only such codewords and deleting the ith coordinate.
ENEE 739C: Advanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 6a (draft; 9/21/03. Linear codes. Weights, supports, ranks. http://.enee.umd.edu/ abarg/enee739c/course.html
More information6.4 BASIS AND DIMENSION (Review) DEF 1 Vectors v 1, v 2,, v k in a vector space V are said to form a basis for V if. (a) v 1,, v k span V and
6.4 BASIS AND DIMENSION (Review) DEF 1 Vectors v 1, v 2,, v k in a vector space V are said to form a basis for V if (a) v 1,, v k span V and (b) v 1,, v k are linearly independent. HMHsueh 1 Natural Basis
More informationMorita equivalence based on Morita context for arbitrary semigroups
Hacettepe Journal of Mathematics and Statistics Volume 45 (4) (2016), 1083 1090 Morita equivalence based on Morita context for arbitrary semigroups Hongxing Liu Keywords: Abstract In this paper, we study
More informationCyclotomic Cosets, Codes and Secret Sharing
Malaysian Journal of Mathematical Sciences 11(S) August: 59-73 (017) Special Issue: The 5th International Cryptology and Information Security Conference (New Ideas in Cryptology) MALAYSIAN JOURNAL OF MATHEMATICAL
More informationInternational Mathematical Forum, Vol. 6, 2011, no. 4, Manjusri Basu
International Mathematical Forum, Vol 6, 011, no 4, 185-191 Square Designs on New Binary ( 3n 1, 3 n ) Codes Manjusri Basu Department of Mathematics University of Kalyani Kalyani, WB, India, Pin-74135
More informationDifference Systems of Sets and Cyclotomy
Difference Systems of Sets and Cyclotomy Yukiyasu Mutoh a,1 a Graduate School of Information Science, Nagoya University, Nagoya, Aichi 464-8601, Japan, yukiyasu@jim.math.cm.is.nagoya-u.ac.jp Vladimir D.
More informationINTELLIGENT SEARCH FOR AND MINIMUM ABERRATION DESIGNS
Statistica Sinica 8(1998), 1265-1270 INTELLIGENT SEARCH FOR 2 13 6 AND 2 14 7 MINIMUM ABERRATION DESIGNS Jiahua Chen University of Waterloo Abstract: Among all 2 n k regular fractional factorial designs,
More informationDichotomy Theorems for Counting Problems. Jin-Yi Cai University of Wisconsin, Madison. Xi Chen Columbia University. Pinyan Lu Microsoft Research Asia
Dichotomy Theorems for Counting Problems Jin-Yi Cai University of Wisconsin, Madison Xi Chen Columbia University Pinyan Lu Microsoft Research Asia 1 Counting Problems Valiant defined the class #P, and
More informationOn the Classification of Splitting (v, u c, ) BIBDs
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 5 Special Thematic Issue on Optimal Codes and Related Topics Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081
More informationSubalgebras and ideals in BCK/BCI-algebras based on Uni-hesitant fuzzy set theory
EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 11, No. 2, 2018, 417-430 ISSN 1307-5543 www.ejpam.com Published by New York Business Global Subalgebras and ideals in BCK/BCI-algebras based on Uni-hesitant
More informationPRIMITIVE SPACES OF MATRICES OF BOUNDED RANK.II
/. Austral. Math. Soc. (Series A) 34 (1983), 306-315 PRIMITIVE SPACES OF MATRICES OF BOUNDED RANK.II M. D. ATKINSON (Received 18 December 1981) Communicated by D. E. Taylor Abstract The classification
More informationMax-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig
Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig Coherence of Assistance and Regularized Coherence of Assistance by Ming-Jing Zhao, Teng Ma, and Shao-Ming Fei Preprint no.: 14 2018
More informationNew Families of Triple Error Correcting Codes with BCH Parameters
New Families of Triple Error Correcting Codes with BCH Parameters arxiv:0803.3553v1 [cs.it] 25 Mar 2008 Carl Bracken School of Mathematical Sciences University College Dublin Ireland May 30, 2018 Abstract
More informationOn the Convergence of the Summation Formulas Constructed by Using a Symbolic Operator Approach
On the Convergence of the Summation Formulas Constructed by Using a Symbolic Operator Approach Tian-Xiao He 1, Leetsch C. Hsu 2, and Peter J.-S. Shiue 3 1 Department of Mathematics and Computer Science
More informationResearch Article Fast Constructions of Quantum Codes Based on Residues Pauli Block Matrices
Advances in Mathematical Physics Volume 2010, Article ID 469124, 12 pages doi:10.1155/2010/469124 Research Article Fast Constructions of Quantum Codes Based on Residues Pauli Block Matrices Ying Guo, Guihu
More informationThe L(3, 2, 1)-labeling on the Skew and Converse Skew Products of Graphs
Advances in Theoretical and Applied Mathematics. ISSN 0973-4554 Volume 11, Number 1 (2016), pp. 29 36 Research India Publications http://www.ripublication.com/atam.htm The L(3, 2, 1)-labeling on the Skew
More information. We reproduce from the known exact formulae for γ(k,n) (see [5, 1]) the corresponding
AN ASYMPTOTIC FORMULA IN q FOR THE NUMBER OF [n,k] q-ary MDS CODES KRISHNA KAIPA arxiv:1311.0461v1 [cs.it] 3 Nov 2013 Abstract. We obtain an asymptotic formula in q for the number of MDS codes of length
More informationChapter 2. Error Correcting Codes. 2.1 Basic Notions
Chapter 2 Error Correcting Codes The identification number schemes we discussed in the previous chapter give us the ability to determine if an error has been made in recording or transmitting information.
More informationThe Binary Self-Dual Codes of Length Up To 32: A Revised Enumeration*
The Binary Self-Dual Codes of Length Up To 32: A Revised Enumeration* J. H. Conway Mathematics Department Princeton University Princeton, New Jersey 08540 V. Pless** Mathematics Department University of
More information