ON THE RELATIVE GENERALIZED HAMMING WEIGHTS OF A 4-DIMENSIONAL LINEAR CODE AND A SUBCODE WITH DIMENSION ONE

Size: px
Start display at page:

Download "ON THE RELATIVE GENERALIZED HAMMING WEIGHTS OF A 4-DIMENSIONAL LINEAR CODE AND A SUBCODE WITH DIMENSION ONE"

Transcription

1 J Syst Sci Complex (2012) 25: ON THE RELATIVE ENERALIZED HAMMIN WEIHTS OF A 4-DIMENSIONAL LINEAR CODE AND A SUBCODE WITH DIMENSION ONE Zihui LIU Wende CHEN DOI: /s Received: 5 August 2010 / Revised: 2 January 2011 c The Editorial Office of JSSC & Springer-Verlag Berlin Heidelberg 2012 Abstract Finite projective geometry method is effectively used to study the relative generalized Hamming weights of 4-dimensional linear codes, which are divided into 9 classes in order to get much more information about the relative generalized Hamming weights, and part of the relative generalized Hamming weights of a 4-dimensional linear code with a 1-dimensional subcode are determined. Key words eneralized Hamming weight, relative difference sequence, relative generalized Hamming weight, support weight. 1 Introduction The relative generalized Hamming weights (RHWs) of a linear code were first introduced in [1] by improving the wire-tap channel of type II with the coset coding scheme invented by Ozarow and Wyner [2], and they generalized the well-known generalized Hamming weights (HWs) [3] to a two-code format. Like HWs, RHWs not only have usage in analyzing the coordinated multiparty wire-tap channel of type II [1], but also bring us much information about the structure of a linear code and its subcodes, so to determine HWs and RHWs is a basic and meaningful work. The HWs of linear codes with small dimensions (for example, dimension = 3, 4, 5) were extensively studied in [4 8]. In parallel with these research work, Ozarow and Wyner [2] determined all the RHWs of a 3-dimensional linear code with its subcodes. Part of the RHWs of a 4-dimensional linear code with its subcodes were determined in [10]. More concisely, in [10], almost all the RHWs of a 4-dimensional linear code with a subcode with dimension greater than one were determined, and for a 4-dimensional linear code with a subcode with dimension one, only the RHWs of the former four classes were studied according to the classification in this paper, and other classes remained unsolved. In this paper, we will study the properties of the RHWs of other classes and determine part of the RHWs. Zihui LIU Department of Mathematics, Beijing Institute of Technology, Beijing , China. lzhui@bit.edu.cn. Wende CHEN Institute of Systems Science, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing , China. This research is supported by the National Natural Science Foundation of China under rant Nos and , and the Special Training Program of Beijing Institute of Technology. This paper was recommended for publication by Editor Xiao-Shan AO.

2 822 ZIHUI LIU WENDE CHEN 2 Finite Projective eometry Methods 2.1 Notations and Definitions Let J be a subset of I = {1, 2,,n}. The subcode C J of a linear [n, k] codec is defined as the set {(c 1,c 2,,c n ) C c t =0fort/ J}. For any subcode D of C, the support of D denoted by χ(d), is defined as the set of positions where not all the codewords of D have zero coordinates. The support weight of D denoted as w S (D) isdefinedasfollows:w S (D) = χ(d). Definition 1 [3] Let C be an [n, k] linear code. The HWs of C are defined as the parameters d r,1 r k, where d r (C) =min{w S (D) D is an [n, r] subcode of C}, 1 r k. In particular, d 1 is the minimum distance of C. Definition 2 [1] Let C be an [n, k] linear code and C 1 be a k 1 -dimensional subcode of C. Then the RHWs of C and C 1 are defined as the parameters M j,1 j k k 1,where Or equivalently, M j = M j (C, C 1 )=min{ J dim(c J ) dim(c 1 J) j}, 1 j k k 1. M j (C, C 1 )=min{ J dim(c J ) dim(c 1 J)=j}, 1 j k k 1. Obviously, if C 1 = {0}, then the HWs of C are retrieved. RHWs are therefore a generalization of HWs. In order to introduce finite geometry methods, we give another version of the definition of RHWs. Definition 3 [9] The RHWs of C and C 1 can also be described as the parameters M j, 1 j k k 1, where M j (C, C 1 )=min{w S (D) D is a subcode of C, dim D = j, D C 1 = {0}} =min{w S (D) D is a subcode of C, dim D dim D C 1 = j}. Definition 4 Assume the RHWs of an [n, k] codec andan[n, k 1 ] subcode C 1 are (M 1,,M k k1 ). Let M 0 = 0, then the relative difference sequence (RDS) of C and C 1 is the sequence (i 0, i 1,, i k k1 ), where i 0 = n M k k1, i j = M k k1 j+1 M k k1 j, 1 j k k 1. Obviously, (i 0, i 1,, i k k1 )and(m 1, M 2,, M k k1, n) can be determined from each other. 2.2 Projective Subspaces and Subcodes We describe projective geometry methods in what follows. Let u =(u 1,u 2,,u k ) F (q) k be a row vector (or the column vector (u 1,u 2,,u k ) T ), and L be a subset of the k coordinate positions of the vector u. Define P L (u) F (q) k such that the t-th component of P L (u) isu t if t L and 0 if t/ L. An example is as follows: Let L = {2, 4} and u =(u 1,u 2,u 3,u 4,u 5 ) F (q) 5 (or the column vector (u 1,u 2,u 3,u 4,u 5 ) T ), then P L (u) = (0,u 2, 0,u 4, 0) (or P L (u) = (0,u 2, 0,u 4, 0) T ). If L = {1, 2}, then P L (u) = (u 1,u 2, 0, 0, 0) (or P L (u) =(u 1,u 2, 0, 0, 0) T ). For a subset U F (q) k, define P L (U) ={P L (u) u U}. Obviously, if U is a subspace of F (q) k,soisp L (U).

3 ON THE RELATIVE ENERALIZED HAMMIN WEIHTS 823 Let A be a generator matrix for a k-dimensional linear code C, thena can naturally determine a correspondence: m: F (q) k Z such that for any u F (q) k, m(u) denotes the number of occurrences of u as a column in A. m(u) is called the value of u. Define the value of a subset U of F (q) k as follows: m(u) = u U m(u). Lemma 1 [10] matrix of C is Let C be an [n, k] code, and C 1 an [n, k 1 ] subcode of C. Assume a generator A = ( Ak1 n A (k k1) n where A k1 n is a generator matrix for C 1. Then there is a one-one correspondence between the set of the j-dimensional subcodes D satisfying D C 1 = {0} and the set of the (k j)- dimensional subspaces U F (q) k satisfying dim(p L (U)) = k 1 such that if D corresponds to U, thenm(u) =n w S (D), where1 j k k 1,andL = {1, 2,,k 1 } represents the first k 1 coordinate positions of the vectors in F (q) k. Let C, C 1,D and A be as in Lemma 1. If y is a column of A, andx = αy for some nonzero α F (q), then we may replace y by x without changing the support weight of the subcode D. Therefore, as in [4] (also see [11]), we may look at the columns of A as the projective points in P(k 1,q). Then m(x) means the number of occurrences of x as a point in P(k 1,q)in the columns of A. Then the correspondence m : F (q) k Z defined before becomes a value function (also called a value assignment [4] ) ), m : P(k 1,q) Z( 0). For any point p P(k 1,q), we call m(p) thevalueofp. Correspondingly, m(u) in Lemma 1 is called the value of the projective subspace U whenever we view the vectors in U as projective points in P(k 1,q). A value function m( ) defines a generator matrix and a code (up to equivalence). Definition 3 tells us that M j (C, C 1 )=min{w S (D) D is a subcode of C, dim D = j, D C 1 = {0}}, 0 j k k 1. We can assume M j (C, C 1 )=w S (D )forsomed satisfying D C 1 = {0}. By Lemma 1, D corresponds to a (k j)-dimensional subspace U F (q) k satisfying dim(p L (U )) = k 1 such that m(u )=n w S (D ). Now, we consider U as a (k j 1)-dimensional projective subspace of P(k 1,q), and still denote it by U.Thendim(P L (U )) = k 1 1. So we can get max{m(u) U P(k 1,q), dim U = k j 1 and dim(p L (U)) = k 1 1} k k 1 j = m(u )=n w S (D )=n M j = i t, where 0 j k k 1. (1) t=0 Summarize finite projective geometry methods as follows: to construct a linear k-dimensional code C and a k 1 -dimensional subcode C 1 with the parameters (M 1, M 2,, M k k1, n), it is necessary to construct a value function m( ) satisfying (1).

4 824 ZIHUI LIU WENDE CHEN 3 On the RHWs of a 4-Dimensional Linear Code C and a 1-Dimensional Subcode C Classification Let E =(1, 0, 0, 0),F =(0, 1, 0, 0), =(0, 0, 1, 0),H =(0, 0, 0, 1) be the basis points of V = P(3,q) in this section (see Figure 1). The projective subspace spanned by two points, e.g., A and B, is called a line, and denoted AB. The projective subspace spanned by three points, e.g., A, B and C, is called a plane, and denoted ÂBC. By Lemma 1, the j-dimensional (1 j 3) subcodes D satisfying D C 1 = {0} are 1-1 corresponding to the (3 j)-dimensional subspaces U P(3,q) satisfying dim(p L (U)) = k 1 1=0,whereL = {1} {1, 2, 3, 4}. Itisafactthatdim(P L (U)) = 0 for L = {1} means U FH. So, the construction of a value function m( ) satisfying (1) is equivalent to that of m( ) such that max{m(p) p is a point of P(3,q)andp/ FH} = i 0, max{m(l) l is a line of P(3,q)andl FH} = i 0 + i 1, max{m( ) is a plane of P(3,q)and FH} = i 0 + i 1 + i 2, m(v )=m(p(3,q)) = i 0 + i 1 + i 2 + i 3. (2) Define MU 0 = {p m(p) =i 0,p is a point and p/ FH}, MU 1 = {l m(l) =i 0 + i 1,l is a line and l FH}, MU 2 = { m( ) =i 0 + i 1 + i 2, is a plane and FH}. We introduce some conditions which may or may not be true. Then according to these conditions we can divide the analysis of the RHWs of a 4-dimensional code and a 1-dimensional subcode into several classes. In such a way, we can obtain much information about the RHWs. (Con1) There exist p MU 0,l MU 1, and P MU 2 such that p l P. (Con2) There exist p MU 0 and l MU 1 such that p l. (Con3) There exist p MU 0 and P MU 2 such that p P. (Con4) There exist l MU 1 and P MU 2 such that l P. According to whether (Con1) (Con4) are true or false, we can divide codes (and value functions) into 9 classes: Class A: Con2, Con3, Con1, Con4 true. Then we call the RDS ARDS. Class B: Con2, Con3 true; Con1, Con4 false. Then we call the RDS BRDS. Class C: Con3, Con4 true; Con1, Con2 false. Then we call the RDS CRDS. Class D: Con2, Con3, Con4 true; Con1 false. Then we call the RDS DRDS. Class E: Con1, Con2, Con4 false, Con3 true. Then we call the RDS ERDS. Class F: Con1, Con3, Con4 false, Con2 true. Then we call the RDS FRDS. Class : Con1, Con3 false; Con2, Con4 true. Then we call the RDS RDS. Class H: Con1, Con2, Con3 false; Con4 true. Then we call the RDS HRDS. Class I: Con1, Con2, Con3, Con4 false. Then we call the RDS IRDS. We have described in [10] the properties of the RHWs of Class A Class D by a group of non-equalities satisfied by their RDS. Conversely, we have showed part of the sequences satisfying these non-equalities are the RHWs of Class A Class D, respectively.

5 ON THE RELATIVE ENERALIZED HAMMIN WEIHTS 825 In this paper, we will give the properties of the RHWs of all other 5 classes of codes and determine part of the RHWs. We also show that the sequences satisfying the upper bound of the non-equalities in Class B and Class D are the RHWs of these two classes, respectively. 3.2 Results about the RHWs Class A: See [10]. Class B: The result of Class B is Theorem 1 If a sequence (i 0,i 1,i 2,i 3 ) is a BRDS, then it must satisfy i 0 1, i 1 2, i 2 qi 1 (q +1), i 3 qi 2 (q +1),i 3 i 1. Conversely, almost all the sequences satisfying the upper bound are BRDSs. E F H Figure 1 The upper bound construction of Class B Proof We have showed a BRDS has the properties listed above in [10]. Conversely, to show almost all the sequences (i 0, i 1, i 2, i 3 ) satisfying the upper bound, that is, satisfying i 2 = qi 1 (q +1)andi 3 = qi 2 (q + 1), are BRDSs, it is necessary to construct a value function m( ) satisfying the conditions in Class B for almost all such sequences. In Figure 1, choose a point on each of the q + 1 lines passing through F in the plane FH and denote them by I 1, I 2,, I q+1, respectively. Let I t / H for 1 t q +1. Thenm( ) can be constructed as follows: i 1, p = F, i 1 1, p H, m(p) = i 1 3, p = I k, where k =1, 2,,q+1, i 1 1, other points in FH, 0, other points in P(3,q). Using this value function, we can check that m(e) =i 0, m(ef) =i 0 + i 1 and m(êh) = i 0 + i 1 + i 2. So E MU 0, EF MU 1 and ÊH MU 2. Using this value function, we can further check all the other conditions in Class B are satisfied. Note that such a value function is meaningful only if i 1 3. So, we can get all the sequences satisfying i 2 = qi 1 (q +1),i 3 = qi 2 (q +1), i 1 3, and i 0 1 are BRDS. Comparing with all the sequences in Theorem 1 satisfying the upper bound, we can see that almost all the sequences satisfying the upper bound are BRDS.

6 826 ZIHUI LIU WENDE CHEN Class C: See [10]. Class D: The result of Class D is Theorem 2 If a sequence (i 0,i 1,i 2,i 3 ) is a DRDS, then i 0 1, i 1 1, i 0 i 2 qi 1 (q +1), i 1 i 3 qi 2 (q +1). Conversely, almost all the sequences (i 0,i 1,i 2,i 3 ) satisfying the upper bound are DRDSs. E F I H Figure 2 The upper bound construction for Class D. Proof See [10] for the proof of the properties satisfied by DRDSs. It is still necessary to give the upper bound construction of m( ). Denote the points on the line H in Figure 2 by 0 =, 1,, γ,, q 1, q = H, and the points on the line HF by H 0 = H, H 1,, H γ,, H q 1, H q = F. Assume F i H i = O i for 1 i q 1. Choose a point on the line F and denote it by K. Suppose E i I = J i for 1 i q and i 0 +1=qα + β. Then we can get the upper bound construction m( ) whenever i 0 2q q 1 and i 1 3. i 1, p = F, i 1 1, p =, α +1, p = J i, 1 i β, α, other points on I\{}, i 1 1 α 1, p = i, 1 i β, m(p) = i 1 1 α, other points on H\{}, i 1 3, p = O i, 1 i q 1, i 1 3, p = H 1, i 1 3, p = K, i 1 1, other points in FH, 0, other points in P(3,q). We can show that m(eh) =i 0 + i 1 + i 2 and m(i) =i 0 + i 1, and other conditions stated in Class D can be checked one by one. So m( ) satisfies our demands. In the following upper bound constructions, we need Lemma 2 If there exist a point p MU 0 andalinel MU 1 such that p/ l then i 0 qi 1 ; If Con2 false, then i 0 qi 1 (q +1).

7 ON THE RELATIVE ENERALIZED HAMMIN WEIHTS 827 Proof Assume i 0 >qi 1,thenm(l) =i 0 + i 1 > (q +1)i 1,sothereexistsapointp l such that m(p ) >i 1,thenm(pp 0 ) >i 0 + i 1, a contradiction to (2). Similar arguments show that if Con2 false, then i 0 qi 1 (q +1). Class E: The result of Class E is Theorem 3 If a sequence (i 0,i 1,i 2,i 3 ) is an ERDS, then it must satisfy { i0 +1 i 2 qi 1 (q +1), i 0 +1 i 3 qi 2 (q +1). Conversely, almost all the sequences satisfying the upper bound are ERDSs. Proof If a sequence (i 0,i 1,i 2,i 3 ) is an ERDS, then there exist a point p MU 0 and a plane MU 2 such that p, but any line in passing through the point p has the value at most i 0 + i 1 1, so i 0 + i 1 + i 2 = m( ) (q +1)(i 0 + i 1 1) qi 0,thatis,i 2 qi 1 (q + 1). Further, any plane in P(3,q) passing through a fixed line l MU 1 has a value at most i 0 + i 1 + i 2 1, so i 0 + i 1 + i 2 + i 3 = m(p(3,q)) (q +1)(i 0 + i 1 + i 2 1) q(i 0 + i 1 ), that is, i 3 qi 2 (q +1). Assume p 0 = l,thenm(p 0 ) i 1 1sincem(pp 0 ) i 0 + i 1 1. Since m(p(3,q)\ ) = i 3 m(l\p 0 ), we get that i 0 +1 i 3. Further, the plane passing through the point p and the line l has a value at most i 0 + i 1 + i 2 1, so m(p)+m(l) =i 0 +(i 0 + i 1 ) i 0 + i 1 + i 2 1, that is, i 0 +1 i 2. Conversely (see Figure 3), assume i 0 +1=qα + β and ĜIJ FH = L, wherel FH and 0 β q 1. Denote the q points on the line I\{} by 1, 2,, q 1, q = I, respectively. Suppose E i H = O i for 1 i q, whereo q = H. Then the upper bound construction is given as follows: m(p) = i 1 3, p = F, i 1 1, other points on the line F 2, p = J α +1, p = i for 1 i β α, other points on the line I\{} i 1 2 α, p = O i for 1 i β i 1 1 α, other points on the line H\{, H} i 1 1, points on the plane FH i 1 5, p = L i 1 2 α, p = H = O q i 1 3, p FH\{F, H, L} 0, other points in P(3,q). We first note that i 1 α = i 1 i0+1 q > 0 by Lemma 2, so we can make m(p) 0 for all the points p P(3,q)onlyifi 1 is large enough. So the value function m( ) is meaningful. In addition, we can check that I MU 1, ÊF MU 2 and other details so that m( ) satisfies our demands.

8 828 ZIHUI LIU WENDE CHEN E J F I H L Figure 3 The upper bound construction for Class E Class F: The result of Class F is Theorem 4 If a sequence (i 0,i 1,i 2,i 3 ) is an FRDS, then it must satisfy { i2 qi (I) 1 +1 i 0 i 3 qi 2 (q +1) or (II) qi 1 +1 i 2 i 0 i 3 qi 2 (q +1) i 2 + i 3 (q 2 + q)i 1, conversely, almost all the sequences satisfying the upper bound in (I) are FRDSs. Proof The proof of i 0 i 3 qi 2 (q + 1) is similar to Class E, and the details are omitted. Since any plane passing through a fixed point p MU 0 has the value at most i 0 + i 1 + i 2 1 or i 0 +(q +1)i 1,wegetthati 2 qi 1 +1ifi 0 + i 1 + i 2 1 i 0 +(q +1)i 1 or i 2 qi 1 +1if i 0 +(q +1)i 1 i 0 + i 1 + i 2 1. There are altogether (q 2 + q + 1) lines passing through the point p in P(3,q), so i 0 + i 1 + i 2 + i 3 = m(p(3,q)) i 0 +(q 2 + q +1)i 1,soi 2 + i 3 (q 2 + q)i 1. Note that i 2 + i 3 (q 2 + q)i 1 is not necessary in (I) since we can get it from (I) itself. E F I H Figure 4 the upper bound construction for Class F (I) Conversely (see Figure 4), assume i 0 +1 = q 2 ζ +(q +1)η +σ, where0 η q 1, 0 σ q and σ =0ifη = q 1. Denote the points on the line Fby F 0 = F, F 1,, F q =, and denote the q 1 points on the line IF i \{I,F i } by ξ i1, ξ i2,, ξ iq 1 for 0 i q. LetQ represent an arbitrary point in FH\F, and suppose EQ FI = E Q. Then we can construct a desired

9 ON THE RELATIVE ENERALIZED HAMMIN WEIHTS 829 upper bound value function as follows. m(p) = i 1, p F, ζ +1, p = ξ i1,ξ i2,ξ iη+1 for 0 i, σ 1, ζ +1, p = ξ i1,ξ i2,ξ iη for σ i q, ζ, the other points in FI\F, i 1 m(e Q ), p = Q FH\F, 0, the other points in P(3,q). Using this value function, we can get all the sequences satisfying the upper bound in (I) are FRDSs only if i 0 >q+1. Class : The result of Class is Theorem 5 If a sequence (i 0,i 1,i 2,i 3 ) is a RDS, then it must satisfy (I) { i0 +1 i 2 qi 1 +1, i 0 i 3 qi 2 (q +1), or (II) { max{i0 +1,qi 1 +1} i 2, i 2 + i 3 (q 2 + q)i 1, conversely, almost all the sequences satisfying the upper bound of (I) are RDSs. E J F I H Figure 5 The upper bound construction for Class (I) Proof Similarly as before, we only give an upper bound value function, the details are omitted (see Figure 5). Assume i 0 = qα + β and choose a point J IF\{I,F}. Suppose EJ FH = K. If a sequence is a RDS, then there exist a point p MU 0, two lines l 1 MU 1, l 2 MU 1 and a plane MU 2 such that p l 1, l 2 but p / l 2. So i 1 i0 q = α by Lemma 2. Denote the q points on I\{} by I 0 = I, I 1,, I q 1. Suppose EI k H = H k,where0 k q 1andH 0 = H. Then we can give an upper bound value function as follows: 1, p = J, α +1, p = I k for 0 k β 1, α, the other points of I\{}, m(p) = i 1 α 1, p = H k for 0 k β 1, i 1 α, the other points of H\{}, i 1 1, p = K, i 1, the other points in FH, 0, the other points in P(3,q).

10 830 ZIHUI LIU WENDE CHEN Class H: The result of Class H is Theorem 6 If a sequence (i 0,i 1,i 2,i 3 ) is an HRDS, then it must satisfy i 0 +1 i 2 qi 1 q, max{i 0 +1,qi 1 q} i 2, (I) i 2 + i 3 (q 2 + q)i 1 (q 2 + q +1), or (II) i 2 + i 3 (q 2 + q)i 1 (q 2 + q +1), i 0 i 3, i 0 i 3, conversely, almost all the sequences satisfying the upper bound of (I) are HRDSs (see Figure 6). E F I H Figure 6 The upper bound construction for Class H (I) Proof Still denote the q points on I\{} by I 0 = I, I 1,, I q 1. Suppose EI k H = H k,where0 k q 1andH 0 = H. Assume i 0 +1 = qα + β, then we can get i 1 > i0+1 q = α again from Lemma 2. So an upper bound value function below is meaningful: m(p) = α +1, p = I k for 0 k β 1, α, p = I k for β k q 1, i 1 2 α, p = H k for 0 k β 1, i 1 1 α, p = H k for β k q 1, i 1 1, the other points in FH, 0, the other points in P(3,q). It can be checked similarly that this value function satisfies our demands only if i 0 is large enough, that is, i 0 >f(q), where f(q) is a function of q. Class I: The result of Class I is Theorem 7 If a sequence (i 0,i 1,i 2,i 3 ) is an IRDS, then it must satisfy { i0 +1 i (I) 2 qi 1 q, 2i 0 +1 i 3 qi 2 (q +1), or (II) max{i 0 +1,qi 1 q} i 2, 2i 0 +1 i 3 qi 2 (q +1), i 2 + i 3 (q 2 + q)i 1 (q 2 + q +1), conversely, almost all the sequences satisfying the upper bound of (I) are HRDSs (see Figure 7). Proof Assume i 0 +1 = qα+β and α =(q 1)ξ +γ, where0 β q 1 and0 γ q 2, then i 0 +2=q(q 1)ξ + qγ + β + 1. Choose the points I,J EH\{E,H}. Denotetheq +1 points on the line FH by F 1 = F, F 2,, F q+1 = H. Denote the q points on H\{} by H 1 = H, H 2,, H q. Assume ĜJF 2 EF = K and EH k J = J k for 1 k q. LetQ be an arbitrary point in ĜIF \{I F }, andeq ĜF H = E Q.ThenE Q ĜHF \{H F }.

11 ON THE RELATIVE ENERALIZED HAMMIN WEIHTS 831 E K F I H J Figure 7 The upper bound construction for Class I (I) We first assign to qγ + β + 1 points among ĜIF \{I F } each the value ξ + 1, and to the other points in ĜIF \{I F } each the value ξ. Then we can give m(p) = 1, p = K, i 1 2, p = F, i 1 1, p F\F, α +1, p = J k for 1 k β, α, p = J k for β k q, i 1 2 α, p = H k for 1 k β, i 1 1 α, p = H k for β k q, i 1 3 m(q), p = E Q = F 2, i 1 2 m(q), p = E Q = F k for 3 k q, i 1 1 m(q), p = E Q, ĜHF \{H F FH}, 0, the other points in P(3,q). Using this value function, we can similarly show that all the upper bound sequences are IRDSs only if i 0 is large enough, that is, i 0 h(q), where h(q) is a function of q. 4 Conclusion Finite geometry methods are effective tools to study RHWs. In this paper, we classify the codes with dimension 4 into 9 classes, and then use finite geometry methods to study the properties of the RHWs of each class and determine part of the RHWs of each class. We have shown almost all the sequences satisfying the upper bound of each class are the corresponding RHWs. Acknowledgements The authors wish to thank the editor and the referees for their comments and suggestions that helped to improve this paper. References [1] Y. Luo, C. Mitrpant, A. J. Han Vinck, and K. F. Chen, Some new characters on the wire-tap channel of type II, IEEE Trans. Inform. Theory, 2005, 51(3):

12 832 ZIHUI LIU WENDE CHEN [2] L. H. Ozarow and A. D. Wyner, Wire-tap channel II, AT&T Bell Laboratories Technical Journal, 1984, 63(10): [3] V. K. Wei, eneralized Hamming weight for linear codes, IEEE Trans. Inform. Theory, 1991, 37(5): [4] W. D. Chen and T. Kløve, The weight hierarchies of q-ary codes of dimension 4, IEEE Trans. Inform. Theory, 1996, 42(6): [5] T. Helleseth, T. Kløve and Ø. Ytrehus, eneralized Hamming weights of linear codes, IEEE Trans. Inform. Theory, 1992, 38(3): [6] W. D. Chen and T. Kløve, Weight hierarchies of extremal non-chain binary codes of dimension 4, IEEE Trans. Inform. Theory, 1999, 45(1): [7] W. D. Chen and T. Kløve, Weight hierarchies of linear codes of dimension 3, J. Statist. Plann. Inference, 2001, 94(2): [8] W. D. Chen and T. Kløve, Finite projective geometries and classification of the weight hierarchies of codes (I), Acta Mathematica Sinica, English Series, 2004, 20(2): [9] Z. H. Liu, W. D. Chen and X. W. Wu, On the relative generalized Hamming weights of linear codes and their subcodes, SIAM Journal on Discrete Mathematics, 2010, 24(4): [10] Z. H. Liu, W. D. Chen, and Y. Luo, The relative generalized Hamming weight of linear q-ary codes and their subcodes, Des. Codes Cryptogr., 2008, 48(2): [11] M. A. Tsfasman and S. Vladuts, eometric approach to higher weights, IEEE Trans. Inform. Theory, 1995, 41(6):

On the second greedy weight for linear codes ofdimension 3

On the second greedy weight for linear codes ofdimension 3 Discrete Mathematics 241 (2001) 171 187 www.elsevier.com/locate/disc On the second greedy weight for linear codes ofdimension 3 Wende Chen a, Torleiv KlHve b; a System and Control Laboratory, Institute

More information

Flags of almost ane codes

Flags of almost ane codes Flags of almost ane codes Trygve Johnsen Hugues Verdure April 0, 207 Abstract We describe a two-party wire-tap channel of type II in the framework of almost ane codes. Its cryptological performance is

More information

Matrix characterization of linear codes with arbitrary Hamming weight hierarchy

Matrix characterization of linear codes with arbitrary Hamming weight hierarchy Linear Algebra and its Applications 412 (2006) 396 407 www.elsevier.com/locate/laa Matrix characterization of linear codes with arbitrary Hamming weight hierarchy G. Viswanath, B. Sundar Rajan Department

More information

Acta Mathematica Sinica, English Series Springer-Verlag Berlin Heidelberg & The Editorial Office of AMS 2015

Acta Mathematica Sinica, English Series Springer-Verlag Berlin Heidelberg & The Editorial Office of AMS 2015 Acta Mathematica Sinica, English Series Jul., 2015, Vol. 31, No. 7, pp. 1163 1170 Published online: June 15, 2015 DOI: 10.1007/s10114-015-3616-y Http://www.ActaMath.com Acta Mathematica Sinica, English

More information

Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth s second tower

Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth s second tower Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth s second tower arxiv:5.0630v [cs.it] 9 Nov 05 Olav Geil, Stefano Martin, Umberto Martínez-Peñas, Diego Ruano Abstract Asymptotically

More information

Code constructions and existence bounds for relative generalized Hamming weight

Code constructions and existence bounds for relative generalized Hamming weight Des. Codes Cryptogr. 2013) 69:275 297 DOI 10.1007/s10623-012-9657-7 Code constructions and existence bounds for relative generalized Hamming weight Zhuojun Zhuang Yuan Luo Bin Dai Received: 28 November

More information

All Good (Bad) Words Consisting of 5 Blocks

All Good (Bad) Words Consisting of 5 Blocks Acta Mathematica Sinica, English Series Jun, 2017, Vol 33, No 6, pp 851 860 Published online: January 25, 2017 DOI: 101007/s10114-017-6134-2 Http://wwwActaMathcom Acta Mathematica Sinica, English Series

More information

Support weight enumerators and coset weight distributions of isodual codes

Support weight enumerators and coset weight distributions of isodual codes Support weight enumerators and coset weight distributions of isodual codes Olgica Milenkovic Department of Electrical and Computer Engineering University of Colorado, Boulder March 31, 2003 Abstract In

More information

Plotkin s Bound in Codes Equipped with the Euclidean Weight Function

Plotkin s Bound in Codes Equipped with the Euclidean Weight Function Tamsui Oxford Journal of Mathematical Sciences 5() (009) 07-4 Aletheia University Plotkin s Bound in Codes Equipped with the Euclidean Weight Function Sapna Jain Department of Mathematics, University of

More information

MATH/MTHE 406 Homework Assignment 2 due date: October 17, 2016

MATH/MTHE 406 Homework Assignment 2 due date: October 17, 2016 MATH/MTHE 406 Homework Assignment 2 due date: October 17, 2016 Notation: We will use the notations x 1 x 2 x n and also (x 1, x 2,, x n ) to denote a vector x F n where F is a finite field. 1. [20=6+5+9]

More information

Some New Optimal Ternary Linear Codes

Some New Optimal Ternary Linear Codes Designs, Codes and Cryptography, 12, 5 11 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Some New Optimal Ternary Linear Codes ILIYA BOUKLIEV* Institute of Mathematics,

More information

Neighbor Sum Distinguishing Total Colorings of Triangle Free Planar Graphs

Neighbor Sum Distinguishing Total Colorings of Triangle Free Planar Graphs Acta Mathematica Sinica, English Series Feb., 2015, Vol. 31, No. 2, pp. 216 224 Published online: January 15, 2015 DOI: 10.1007/s10114-015-4114-y Http://www.ActaMath.com Acta Mathematica Sinica, English

More information

Maximal perpendicularity in certain Abelian groups

Maximal perpendicularity in certain Abelian groups Acta Univ. Sapientiae, Mathematica, 9, 1 (2017) 235 247 DOI: 10.1515/ausm-2017-0016 Maximal perpendicularity in certain Abelian groups Mika Mattila Department of Mathematics, Tampere University of Technology,

More information

ELA

ELA POSITIVE DEFINITE SOLUTION OF THE MATRIX EQUATION X = Q+A H (I X C) δ A GUOZHU YAO, ANPING LIAO, AND XUEFENG DUAN Abstract. We consider the nonlinear matrix equation X = Q+A H (I X C) δ A (0 < δ 1), where

More information

MTH5102 Spring 2017 HW Assignment 3: Sec. 1.5, #2(e), 9, 15, 20; Sec. 1.6, #7, 13, 29 The due date for this assignment is 2/01/17.

MTH5102 Spring 2017 HW Assignment 3: Sec. 1.5, #2(e), 9, 15, 20; Sec. 1.6, #7, 13, 29 The due date for this assignment is 2/01/17. MTH5102 Spring 2017 HW Assignment 3: Sec. 1.5, #2(e), 9, 15, 20; Sec. 1.6, #7, 13, 29 The due date for this assignment is 2/01/17. Sec. 1.5, #2(e). Determine whether the following sets are linearly dependent

More information

Generalized weights and bounds for error probability over erasure channels

Generalized weights and bounds for error probability over erasure channels Generalized weights and bounds for error probability over erasure channels Leandro Cruvinel Lemes Department of Electrical Engineering Federal University of Triangulo Mineiro Uberaba - MG, Brazil Email:

More information

SOME DESIGNS AND CODES FROM L 2 (q) Communicated by Alireza Abdollahi

SOME DESIGNS AND CODES FROM L 2 (q) Communicated by Alireza Abdollahi Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 3 No. 1 (2014), pp. 15-28. c 2014 University of Isfahan www.combinatorics.ir www.ui.ac.ir SOME DESIGNS AND CODES FROM

More information

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps 2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical

More information

Constructions of digital nets using global function fields

Constructions of digital nets using global function fields ACTA ARITHMETICA 105.3 (2002) Constructions of digital nets using global function fields by Harald Niederreiter (Singapore) and Ferruh Özbudak (Ankara) 1. Introduction. The theory of (t, m, s)-nets and

More information

FIXED POINTS OF MEROMORPHIC SOLUTIONS OF HIGHER ORDER LINEAR DIFFERENTIAL EQUATIONS

FIXED POINTS OF MEROMORPHIC SOLUTIONS OF HIGHER ORDER LINEAR DIFFERENTIAL EQUATIONS Annales Academiæ Scientiarum Fennicæ Mathematica Volumen 3, 2006, 9 2 FIXED POINTS OF MEROMORPHIC SOLUTIONS OF HIGHER ORDER LINEAR DIFFERENTIAL EQUATIONS Liu Ming-Sheng and Zhang Xiao-Mei South China Normal

More information

L p Approximation of Sigma Pi Neural Networks

L p Approximation of Sigma Pi Neural Networks IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 11, NO. 6, NOVEMBER 2000 1485 L p Approximation of Sigma Pi Neural Networks Yue-hu Luo and Shi-yi Shen Abstract A feedforward Sigma Pi neural networks with a

More information

Elementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q),

Elementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q), Elementary 2-Group Character Codes Cunsheng Ding 1, David Kohel 2, and San Ling Abstract In this correspondence we describe a class of codes over GF (q), where q is a power of an odd prime. These codes

More information

LIFTED CODES OVER FINITE CHAIN RINGS

LIFTED CODES OVER FINITE CHAIN RINGS Math. J. Okayama Univ. 53 (2011), 39 53 LIFTED CODES OVER FINITE CHAIN RINGS Steven T. Dougherty, Hongwei Liu and Young Ho Park Abstract. In this paper, we study lifted codes over finite chain rings. We

More information

On the k-error linear complexity for p n -periodic binary sequences via hypercube theory

On the k-error linear complexity for p n -periodic binary sequences via hypercube theory 1 On the k-error linear complexity for p n -periodic binary sequences via hypercube theory Jianqin Zhou Department of Computing, Curtin University, Perth, WA 6102 Australia Computer Science School, Anhui

More information

There are no Barker arrays having more than two dimensions

There are no Barker arrays having more than two dimensions There are no Barker arrays having more than two dimensions Jonathan Jedwab Matthew G. Parker 5 June 2006 (revised 7 December 2006) Abstract Davis, Jedwab and Smith recently proved that there are no 2-dimensional

More information

Uncertain Entailment and Modus Ponens in the Framework of Uncertain Logic

Uncertain Entailment and Modus Ponens in the Framework of Uncertain Logic Journal of Uncertain Systems Vol.3, No.4, pp.243-251, 2009 Online at: www.jus.org.uk Uncertain Entailment and Modus Ponens in the Framework of Uncertain Logic Baoding Liu Uncertainty Theory Laboratory

More information

Duality for poset codes

Duality for poset codes Allan O. Moura Marcelo Firer State University of Campinas Fq9 - UCD, July 13-17 2009 Outline 1 Basic definitions 2 3 Outline Basic Definitions 1 Basic definitions 2 3 Notation Basic Definitions [n] = {1,2,...,n}

More information

Vector spaces. EE 387, Notes 8, Handout #12

Vector spaces. EE 387, Notes 8, Handout #12 Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is

More information

Higher weight distribution of Linearized Reed-Solomon codes

Higher weight distribution of Linearized Reed-Solomon codes Higher weight distribution of Linearized Reed-Solomon codes Haode Yan, Yan Liu, Chunlei Liu arxiv:1505.0778v1 [cs.it] 7 May 015 Abstract Let m, d and be ositive integers such that m e, where e = (m,d).

More information

New Constructions of Permutation Arrays

New Constructions of Permutation Arrays JOURNAL OF LATEX CLASS FILES, VOL. 1, NO. 11, AUGUST 2006 1 New Constructions of Permutation Arrays Lizhen Yang, Kefei Chen, Luo Yuan arxiv:0801.3987v1 [cs.it] 25 Jan 2008 Abstract A permutation array(permutation

More information

LET be the finite field of cardinality and let

LET be the finite field of cardinality and let 128 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 43, NO. 1, JANUARY 1997 An Explicit Construction of a Sequence of Codes Attaining the Tsfasman Vlăduţ Zink Bound The First Steps Conny Voss Tom Høholdt,

More information

Secret-sharing with a class of ternary codes

Secret-sharing with a class of ternary codes Theoretical Computer Science 246 (2000) 285 298 www.elsevier.com/locate/tcs Note Secret-sharing with a class of ternary codes Cunsheng Ding a, David R Kohel b, San Ling c; a Department of Computer Science,

More information

A NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1

A NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1 BULLETIN (New Series) OF THE AMERICAN MATHEMATICAL SOCIETY Volume 23, Number 2, October 1990 A NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1 J. H. CONWAY AND N. J. A. SLOANE ABSTRACT.

More information

On non-antipodal binary completely regular codes

On non-antipodal binary completely regular codes On non-antipodal binary completely regular codes J. Borges, J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, 08193-Bellaterra, Spain. V.A. Zinoviev Institute

More information

Some Extremal Self-Dual Codes and Unimodular Lattices in Dimension 40

Some Extremal Self-Dual Codes and Unimodular Lattices in Dimension 40 Some Extremal Self-Dual Codes and Unimodular Lattices in Dimension 40 Stefka Bouyuklieva, Iliya Bouyukliev and Masaaki Harada October 17, 2012 Abstract In this paper, binary extremal singly even self-dual

More information

The super connectivity of shuffle-cubes

The super connectivity of shuffle-cubes Information Processing Letters 96 (2005) 123 127 www.elsevier.com/locate/ipl The super connectivity of shuffle-cubes Jun-Ming Xu a,,minxu b, Qiang Zhu c a Department of Mathematics, University of Science

More information

Blow-up of solutions for the sixth-order thin film equation with positive initial energy

Blow-up of solutions for the sixth-order thin film equation with positive initial energy PRAMANA c Indian Academy of Sciences Vol. 85, No. 4 journal of October 05 physics pp. 577 58 Blow-up of solutions for the sixth-order thin film equation with positive initial energy WENJUN LIU and KEWANG

More information

A class of mixed orthogonal arrays obtained from projection matrix inequalities

A class of mixed orthogonal arrays obtained from projection matrix inequalities Pang et al Journal of Inequalities and Applications 2015 2015:241 DOI 101186/s13660-015-0765-6 R E S E A R C H Open Access A class of mixed orthogonal arrays obtained from projection matrix inequalities

More information

Secret Sharing Schemes from a Class of Linear Codes over Finite Chain Ring

Secret Sharing Schemes from a Class of Linear Codes over Finite Chain Ring Journal of Computational Information Systems 9: 7 (2013) 2777 2784 Available at http://www.jofcis.com Secret Sharing Schemes from a Class of Linear Codes over Finite Chain Ring Jianzhang CHEN, Yuanyuan

More information

We showed that adding a vector to a basis produces a linearly dependent set of vectors; more is true.

We showed that adding a vector to a basis produces a linearly dependent set of vectors; more is true. Dimension We showed that adding a vector to a basis produces a linearly dependent set of vectors; more is true. Lemma If a vector space V has a basis B containing n vectors, then any set containing more

More information

ON PERTURBATION OF BINARY LINEAR CODES. PANKAJ K. DAS and LALIT K. VASHISHT

ON PERTURBATION OF BINARY LINEAR CODES. PANKAJ K. DAS and LALIT K. VASHISHT Math Appl 4 (2015), 91 99 DOI: 1013164/ma201507 ON PERTURBATION OF BINARY LINEAR CODES PANKAJ K DAS and LALIT K VASHISHT Abstract We present new codes by perturbation of rows of the generating matrix of

More information

AN EQUIVALENCY CONDITION OF NONSINGULARITY IN NONLINEAR SEMIDEFINITE PROGRAMMING

AN EQUIVALENCY CONDITION OF NONSINGULARITY IN NONLINEAR SEMIDEFINITE PROGRAMMING J Syst Sci Complex (2010) 23: 822 829 AN EQUVALENCY CONDTON OF NONSNGULARTY N NONLNEAR SEMDEFNTE PROGRAMMNG Chengjin L Wenyu SUN Raimundo J. B. de SAMPAO DO: 10.1007/s11424-010-8057-1 Received: 2 February

More information

CONSTRUCTION OF SLICED ORTHOGONAL LATIN HYPERCUBE DESIGNS

CONSTRUCTION OF SLICED ORTHOGONAL LATIN HYPERCUBE DESIGNS Statistica Sinica 23 (2013), 1117-1130 doi:http://dx.doi.org/10.5705/ss.2012.037 CONSTRUCTION OF SLICED ORTHOGONAL LATIN HYPERCUBE DESIGNS Jian-Feng Yang, C. Devon Lin, Peter Z. G. Qian and Dennis K. J.

More information

Permutation decoding for the binary codes from triangular graphs

Permutation decoding for the binary codes from triangular graphs Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for

More information

Binary construction of quantum codes of minimum distances five and six

Binary construction of quantum codes of minimum distances five and six Discrete Mathematics 308 2008) 1603 1611 www.elsevier.com/locate/disc Binary construction of quantum codes of minimum distances five and six Ruihu Li a, ueliang Li b a Department of Applied Mathematics

More information

Complete Moment Convergence for Weighted Sums of Negatively Orthant Dependent Random Variables

Complete Moment Convergence for Weighted Sums of Negatively Orthant Dependent Random Variables Filomat 31:5 217, 1195 126 DOI 1.2298/FIL175195W Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Complete Moment Convergence for

More information

arxiv: v1 [math.ra] 11 Aug 2014

arxiv: v1 [math.ra] 11 Aug 2014 Double B-tensors and quasi-double B-tensors Chaoqian Li, Yaotang Li arxiv:1408.2299v1 [math.ra] 11 Aug 2014 a School of Mathematics and Statistics, Yunnan University, Kunming, Yunnan, P. R. China 650091

More information

arxiv: v2 [cs.it] 12 Jul 2018

arxiv: v2 [cs.it] 12 Jul 2018 MDS codes with arbitrary dimensional hull and their applications Gaojun Luo 1, Xiwang Cao 1, arxiv:1807.03166v [cs.it] 1 Jul 018 Friday 13 th July, 018 Abstract The hull of linear codes have promising

More information

On Two Probabilistic Decoding Algorithms for Binary Linear Codes

On Two Probabilistic Decoding Algorithms for Binary Linear Codes On Two Probabilistic Decoding Algorithms for Binary Linear Codes Miodrag Živković Abstract A generalization of Sullivan inequality on the ratio of the probability of a linear code to that of any of its

More information

Mathematics Department

Mathematics Department Mathematics Department Matthew Pressland Room 7.355 V57 WT 27/8 Advanced Higher Mathematics for INFOTECH Exercise Sheet 2. Let C F 6 3 be the linear code defined by the generator matrix G = 2 2 (a) Find

More information

Non-separating 2-factors of an even-regular graph

Non-separating 2-factors of an even-regular graph Discrete Mathematics 308 008) 5538 5547 www.elsevier.com/locate/disc Non-separating -factors of an even-regular graph Yusuke Higuchi a Yui Nomura b a Mathematics Laboratories College of Arts and Sciences

More information

Research Article A Two-Grid Method for Finite Element Solutions of Nonlinear Parabolic Equations

Research Article A Two-Grid Method for Finite Element Solutions of Nonlinear Parabolic Equations Abstract and Applied Analysis Volume 212, Article ID 391918, 11 pages doi:1.1155/212/391918 Research Article A Two-Grid Method for Finite Element Solutions of Nonlinear Parabolic Equations Chuanjun Chen

More information

ON EXPONENTIAL DIVISORS

ON EXPONENTIAL DIVISORS ON EXPONENTIAL DIVISORS E. G. STRAUS AND M. V. SUBBARAO Let ()(N) denote the sum of the exponential divisors of N, that is, divisors of the form pl b... pbr, b. a, 1, r, when N has the cnonical form pla...,

More information

arxiv: v1 [math.co] 27 Jul 2015

arxiv: v1 [math.co] 27 Jul 2015 Perfect Graeco-Latin balanced incomplete block designs and related designs arxiv:1507.07336v1 [math.co] 27 Jul 2015 Sunanda Bagchi Theoretical Statistics and Mathematics Unit Indian Statistical Institute

More information

Matrix expression and reachability analysis of finite automata

Matrix expression and reachability analysis of finite automata J Control Theory Appl 2012 10 (2) 210 21 DOI 101007/s11768-012-1178-4 Matrix expression and reachability analysis of finite automata Xiangru XU, Yiguang HONG Key Laboratory of Systems and Control, Academy

More information

Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q)

Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q) Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q) M. Lavrauw L. Storme G. Van de Voorde October 4, 2007 Abstract In this paper, we study the p-ary linear code C k (n, q),

More information

Possible numbers of ones in 0 1 matrices with a given rank

Possible numbers of ones in 0 1 matrices with a given rank Linear and Multilinear Algebra, Vol, No, 00, Possible numbers of ones in 0 1 matrices with a given rank QI HU, YAQIN LI and XINGZHI ZHAN* Department of Mathematics, East China Normal University, Shanghai

More information

Open Questions in Coding Theory

Open Questions in Coding Theory Open Questions in Coding Theory Steven T. Dougherty July 4, 2013 Open Questions The following questions were posed by: S.T. Dougherty J.L. Kim P. Solé J. Wood Hilbert Style Problems Hilbert Style Problems

More information

New binary self-dual codes of lengths 50 to 60

New binary self-dual codes of lengths 50 to 60 Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) New binary self-dual codes of lengths 50 to 60 Nikolay Yankov Moon Ho Lee Received: date / Accepted: date Abstract Using

More information

On the simplest expression of the perturbed Moore Penrose metric generalized inverse

On the simplest expression of the perturbed Moore Penrose metric generalized inverse Annals of the University of Bucharest (mathematical series) 4 (LXII) (2013), 433 446 On the simplest expression of the perturbed Moore Penrose metric generalized inverse Jianbing Cao and Yifeng Xue Communicated

More information

On the floor and the ceiling of a divisor

On the floor and the ceiling of a divisor Finite Fields and Their Applications 12 (2006) 38 55 http://www.elsevier.com/locate/ffa On the floor and the ceiling of a divisor Hiren Maharaj, Gretchen L. Matthews 1 Department of Mathematical Sciences,

More information

Formally self-dual additive codes over F 4

Formally self-dual additive codes over F 4 Formally self-dual additive codes over F Sunghyu Han School of Liberal Arts, Korea University of Technology and Education, Cheonan 0-708, South Korea Jon-Lark Kim Department of Mathematics, University

More information

2.4 Root space decomposition

2.4 Root space decomposition 34 CHAPTER 2. SEMISIMPLE LIE ALGEBRAS 2.4 Root space decomposition Let L denote a semisimple Lie algebra in this section. We will study the detailed structure of L through its adjoint representation. 2.4.1

More information

ORTHOGONAL ARRAYS CONSTRUCTED BY GENERALIZED KRONECKER PRODUCT

ORTHOGONAL ARRAYS CONSTRUCTED BY GENERALIZED KRONECKER PRODUCT Journal of Applied Analysis and Computation Volume 7, Number 2, May 2017, 728 744 Website:http://jaac-online.com/ DOI:10.11948/2017046 ORTHOGONAL ARRAYS CONSTRUCTED BY GENERALIZED KRONECKER PRODUCT Chun

More information

Some results concerning global avalanche characteristics of two q-ary functions

Some results concerning global avalanche characteristics of two q-ary functions Some results concerning global avalanche characteristics of two -ary functions Brajesh Kumar Singh Department of Mathematics, School of Allied Sciences, Graphic Era Hill University, Dehradun-4800 (Uttarakhand)

More information

A construction of optimal sets of FH sequences

A construction of optimal sets of FH sequences AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 50 2011, Pages 37 44 A construction of optimal sets of FH sequences Bin Wen Department of Mathematics Changshu Institute of Technology Changshu 215500, Jiangsu

More information

Burst Error Enumeration of m-array Codes over Rings and Its Applications

Burst Error Enumeration of m-array Codes over Rings and Its Applications EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 3 No. 4 2010 653-669 ISSN 1307-5543 www.epam.com Burst Error Enumeration of m-array Codes over Rings and Its Applications İrfan Şiap Department of

More information

A New Class of Refined Eulerian Polynomials

A New Class of Refined Eulerian Polynomials 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018), Article 18.5.5 A New Class of Refined Eulerian Polynomials Hua Sun College of Sciences Dalian Ocean University Dalian 116023 PR China sunhua@dlou.edu.cn

More information

New Inequalities for q-ary Constant-Weight Codes

New Inequalities for q-ary Constant-Weight Codes New Inequalities for q-ary Constant-Weight Codes Hyun Kwang Kim 1 Phan Thanh Toan 1 1 Department of Mathematics, POSTECH International Workshop on Coding and Cryptography April 15-19, 2013, Bergen (Norway

More information

Cryptanalysis of the Wu}Dawson Public Key Cryptosystem

Cryptanalysis of the Wu}Dawson Public Key Cryptosystem Finite Fields and Their Applications 5, 386}392 (1999) Article ID!ta.1999.0264, available online at http://www.idealibrary.com on Cryptanalysis of the Wu}Dawson Public Key Cryptosystem Peter Roelse Philips

More information

Yimin Wei a,b,,1, Xiezhang Li c,2, Fanbin Bu d, Fuzhen Zhang e. Abstract

Yimin Wei a,b,,1, Xiezhang Li c,2, Fanbin Bu d, Fuzhen Zhang e. Abstract Linear Algebra and its Applications 49 (006) 765 77 wwwelseviercom/locate/laa Relative perturbation bounds for the eigenvalues of diagonalizable and singular matrices Application of perturbation theory

More information

ON THE BETTI NUMBERS OF FILIFORM LIE ALGEBRAS OVER FIELDS OF CHARACTERISTIC TWO

ON THE BETTI NUMBERS OF FILIFORM LIE ALGEBRAS OVER FIELDS OF CHARACTERISTIC TWO REVISTA DE LA UNIÓN MATEMÁTICA ARGENTINA Vol. 58, No. 1, 2017, Pages 95 106 Published online: February 9, 2017 ON THE BETTI NUMBERS OF FILIFORM LIE ALGEBRAS OVER FIELDS OF CHARACTERISTIC TWO IOANNIS TSARTSAFLIS

More information

Periodicity and Distribution Properties of Combined FCSR Sequences

Periodicity and Distribution Properties of Combined FCSR Sequences Periodicity and Distribution Properties of Combined FCSR Sequences Mark Goresky 1, and Andrew Klapper, 1 Institute for Advanced Study, Princeton NJ www.math.ias.edu/~goresky Dept. of Computer Science,

More information

Uncertain Satisfiability and Uncertain Entailment

Uncertain Satisfiability and Uncertain Entailment Uncertain Satisfiability and Uncertain Entailment Zhuo Wang, Xiang Li Department of Mathematical Sciences, Tsinghua University, Beijing, 100084, China zwang0518@sohu.com, xiang-li04@mail.tsinghua.edu.cn

More information

Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function

Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Yindong Chen a,, Fei Guo a, Liu Zhang a a College of Engineering, Shantou University, Shantou 515063, China Abstract Boolean functions

More information

A class of error-correcting pooling designs over complexes

A class of error-correcting pooling designs over complexes DOI 10.1007/s10878-008-9179-4 A class of error-correcting pooling designs over complexes Tayuan Huang Kaishun Wang Chih-Wen Weng Springer Science+Business Media, LLC 008 Abstract As a generalization of

More information

Comments and Corrections

Comments and Corrections 1386 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 59, NO 5, MAY 2014 Comments and Corrections Corrections to Stochastic Barbalat s Lemma and Its Applications Xin Yu and Zhaojing Wu Abstract The proof of

More information

New Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting

New Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting New Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting Hideki Yagi 1, Toshiyasu Matsushima 2, and Shigeichi Hirasawa 2 1 Media Network Center, Waseda University 1-6-1,

More information

NON-MONOTONICITY HEIGHT OF PM FUNCTIONS ON INTERVAL. 1. Introduction

NON-MONOTONICITY HEIGHT OF PM FUNCTIONS ON INTERVAL. 1. Introduction Acta Math. Univ. Comenianae Vol. LXXXVI, 2 (2017), pp. 287 297 287 NON-MONOTONICITY HEIGHT OF PM FUNCTIONS ON INTERVAL PINGPING ZHANG Abstract. Using the piecewise monotone property, we give a full description

More information

Characterizations on Heavy-tailed Distributions by Means of Hazard Rate

Characterizations on Heavy-tailed Distributions by Means of Hazard Rate Acta Mathematicae Applicatae Sinica, English Series Vol. 19, No. 1 (23) 135 142 Characterizations on Heavy-tailed Distributions by Means of Hazard Rate Chun Su 1, Qi-he Tang 2 1 Department of Statistics

More information

Houston Journal of Mathematics. c 2008 University of Houston Volume 34, No. 4, 2008

Houston Journal of Mathematics. c 2008 University of Houston Volume 34, No. 4, 2008 Houston Journal of Mathematics c 2008 University of Houston Volume 34, No. 4, 2008 SHARING SET AND NORMAL FAMILIES OF ENTIRE FUNCTIONS AND THEIR DERIVATIVES FENG LÜ AND JUNFENG XU Communicated by Min Ru

More information

A shortening of C on the coordinate i is the [n 1, k 1, d] linear code obtained by leaving only such codewords and deleting the ith coordinate.

A shortening of C on the coordinate i is the [n 1, k 1, d] linear code obtained by leaving only such codewords and deleting the ith coordinate. ENEE 739C: Advanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 6a (draft; 9/21/03. Linear codes. Weights, supports, ranks. http://.enee.umd.edu/ abarg/enee739c/course.html

More information

6.4 BASIS AND DIMENSION (Review) DEF 1 Vectors v 1, v 2,, v k in a vector space V are said to form a basis for V if. (a) v 1,, v k span V and

6.4 BASIS AND DIMENSION (Review) DEF 1 Vectors v 1, v 2,, v k in a vector space V are said to form a basis for V if. (a) v 1,, v k span V and 6.4 BASIS AND DIMENSION (Review) DEF 1 Vectors v 1, v 2,, v k in a vector space V are said to form a basis for V if (a) v 1,, v k span V and (b) v 1,, v k are linearly independent. HMHsueh 1 Natural Basis

More information

Morita equivalence based on Morita context for arbitrary semigroups

Morita equivalence based on Morita context for arbitrary semigroups Hacettepe Journal of Mathematics and Statistics Volume 45 (4) (2016), 1083 1090 Morita equivalence based on Morita context for arbitrary semigroups Hongxing Liu Keywords: Abstract In this paper, we study

More information

Cyclotomic Cosets, Codes and Secret Sharing

Cyclotomic Cosets, Codes and Secret Sharing Malaysian Journal of Mathematical Sciences 11(S) August: 59-73 (017) Special Issue: The 5th International Cryptology and Information Security Conference (New Ideas in Cryptology) MALAYSIAN JOURNAL OF MATHEMATICAL

More information

International Mathematical Forum, Vol. 6, 2011, no. 4, Manjusri Basu

International Mathematical Forum, Vol. 6, 2011, no. 4, Manjusri Basu International Mathematical Forum, Vol 6, 011, no 4, 185-191 Square Designs on New Binary ( 3n 1, 3 n ) Codes Manjusri Basu Department of Mathematics University of Kalyani Kalyani, WB, India, Pin-74135

More information

Difference Systems of Sets and Cyclotomy

Difference Systems of Sets and Cyclotomy Difference Systems of Sets and Cyclotomy Yukiyasu Mutoh a,1 a Graduate School of Information Science, Nagoya University, Nagoya, Aichi 464-8601, Japan, yukiyasu@jim.math.cm.is.nagoya-u.ac.jp Vladimir D.

More information

INTELLIGENT SEARCH FOR AND MINIMUM ABERRATION DESIGNS

INTELLIGENT SEARCH FOR AND MINIMUM ABERRATION DESIGNS Statistica Sinica 8(1998), 1265-1270 INTELLIGENT SEARCH FOR 2 13 6 AND 2 14 7 MINIMUM ABERRATION DESIGNS Jiahua Chen University of Waterloo Abstract: Among all 2 n k regular fractional factorial designs,

More information

Dichotomy Theorems for Counting Problems. Jin-Yi Cai University of Wisconsin, Madison. Xi Chen Columbia University. Pinyan Lu Microsoft Research Asia

Dichotomy Theorems for Counting Problems. Jin-Yi Cai University of Wisconsin, Madison. Xi Chen Columbia University. Pinyan Lu Microsoft Research Asia Dichotomy Theorems for Counting Problems Jin-Yi Cai University of Wisconsin, Madison Xi Chen Columbia University Pinyan Lu Microsoft Research Asia 1 Counting Problems Valiant defined the class #P, and

More information

On the Classification of Splitting (v, u c, ) BIBDs

On the Classification of Splitting (v, u c, ) BIBDs BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 5 Special Thematic Issue on Optimal Codes and Related Topics Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081

More information

Subalgebras and ideals in BCK/BCI-algebras based on Uni-hesitant fuzzy set theory

Subalgebras and ideals in BCK/BCI-algebras based on Uni-hesitant fuzzy set theory EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 11, No. 2, 2018, 417-430 ISSN 1307-5543 www.ejpam.com Published by New York Business Global Subalgebras and ideals in BCK/BCI-algebras based on Uni-hesitant

More information

PRIMITIVE SPACES OF MATRICES OF BOUNDED RANK.II

PRIMITIVE SPACES OF MATRICES OF BOUNDED RANK.II /. Austral. Math. Soc. (Series A) 34 (1983), 306-315 PRIMITIVE SPACES OF MATRICES OF BOUNDED RANK.II M. D. ATKINSON (Received 18 December 1981) Communicated by D. E. Taylor Abstract The classification

More information

Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig

Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig Coherence of Assistance and Regularized Coherence of Assistance by Ming-Jing Zhao, Teng Ma, and Shao-Ming Fei Preprint no.: 14 2018

More information

New Families of Triple Error Correcting Codes with BCH Parameters

New Families of Triple Error Correcting Codes with BCH Parameters New Families of Triple Error Correcting Codes with BCH Parameters arxiv:0803.3553v1 [cs.it] 25 Mar 2008 Carl Bracken School of Mathematical Sciences University College Dublin Ireland May 30, 2018 Abstract

More information

On the Convergence of the Summation Formulas Constructed by Using a Symbolic Operator Approach

On the Convergence of the Summation Formulas Constructed by Using a Symbolic Operator Approach On the Convergence of the Summation Formulas Constructed by Using a Symbolic Operator Approach Tian-Xiao He 1, Leetsch C. Hsu 2, and Peter J.-S. Shiue 3 1 Department of Mathematics and Computer Science

More information

Research Article Fast Constructions of Quantum Codes Based on Residues Pauli Block Matrices

Research Article Fast Constructions of Quantum Codes Based on Residues Pauli Block Matrices Advances in Mathematical Physics Volume 2010, Article ID 469124, 12 pages doi:10.1155/2010/469124 Research Article Fast Constructions of Quantum Codes Based on Residues Pauli Block Matrices Ying Guo, Guihu

More information

The L(3, 2, 1)-labeling on the Skew and Converse Skew Products of Graphs

The L(3, 2, 1)-labeling on the Skew and Converse Skew Products of Graphs Advances in Theoretical and Applied Mathematics. ISSN 0973-4554 Volume 11, Number 1 (2016), pp. 29 36 Research India Publications http://www.ripublication.com/atam.htm The L(3, 2, 1)-labeling on the Skew

More information

. We reproduce from the known exact formulae for γ(k,n) (see [5, 1]) the corresponding

. We reproduce from the known exact formulae for γ(k,n) (see [5, 1]) the corresponding AN ASYMPTOTIC FORMULA IN q FOR THE NUMBER OF [n,k] q-ary MDS CODES KRISHNA KAIPA arxiv:1311.0461v1 [cs.it] 3 Nov 2013 Abstract. We obtain an asymptotic formula in q for the number of MDS codes of length

More information

Chapter 2. Error Correcting Codes. 2.1 Basic Notions

Chapter 2. Error Correcting Codes. 2.1 Basic Notions Chapter 2 Error Correcting Codes The identification number schemes we discussed in the previous chapter give us the ability to determine if an error has been made in recording or transmitting information.

More information

The Binary Self-Dual Codes of Length Up To 32: A Revised Enumeration*

The Binary Self-Dual Codes of Length Up To 32: A Revised Enumeration* The Binary Self-Dual Codes of Length Up To 32: A Revised Enumeration* J. H. Conway Mathematics Department Princeton University Princeton, New Jersey 08540 V. Pless** Mathematics Department University of

More information