MacWilliams type identities for some new m-spotty weight enumerators over finite commutative Frobenius rings
|
|
- Bernard Knight
- 6 years ago
- Views:
Transcription
1 MacWilliams ype ideniies for some new m-spoy weigh enumeraors over finie commuaive Frobenius rings Minjia Shi School of Mahemaical Sciences of Anhui Universiy, Hefei, Anhui, China Absrac Pas few years have seen an exensive use of RAM chips wih wide I/O daa (e.g. 16, 32, 64 bis) in compuer memory sysems. These chips are highly vulnerable o a special ype of bye error, called an m-spoy bye error, which can be effecively deeced or correced using bye errorconrol codes. The MacWilliams ideniy provides he relaionship beween he weigh disribuion of a code and ha of is dual. This paper inroduces m-spoy Hamming weigh enumeraor, join m-spoy Hamming weigh enumeraor and spli m-spoy Hamming weigh enumeraor for bye error-conrol codes over finie commuaive Frobenius rings as well as m-spoy Lee weigh enumeraor over an infinie family of rings. In addiion, MacWilliams ype ideniies are also derived for hese enumeraors. keywords: Bye error-conrol codes; m-spoy bye error; MacWilliams ideniy MSC(2000) 94B05, 94B15 1 Inroducion The error-conrol codes have a significan role in improving reliabiliy in communicaions and compuer memory sysem [4]. For he pas few years, here has been an increased usage of highdensiy RAM chips wih wide I/O daa, called a bye, in compuer memory sysems. These chips are highly vulnerable o muliple random bi errors when exposed o srong elecromagneic waves, radio-acive paricles or high-energy cosmic rays. To overcome his, a new ype of bye error known as spoy bye error has been inroduced in which he error occurs a random or fewer bis wihin a b-bi bye [16], if more han one spoy bye error occur wihin a b-bi bye, hen i is known as a muliple spoy bye error or m-spoy bye error [15]. To deermine he error-deecing and errorcorrecing capabiliies of a code, some special ypes of polynomials, called weigh enumeraors, are sudied. One of he mos celebraed resuls in he coding heory is he MacWilliams ideniy ha describes how he weigh enumeraor of a linear code and he weigh enumeraor of he dual code relae o each oher. This ideniy has found widespread applicaion in he coding heory [5], especially in he sudy of self-dual codes [2]. Recenly various weigh enumeraors wih respec o m-spoy Hamming (Lee) weigh have been inroduced and sudied. Suzuki e al.[15] defined Hamming weigh enumeraor for binary bye error-conrol codes, and proved a MacWilliams ideniy for i. Özen and Siap [6] and Siap [13] exended his resul o arbirary finie fields and o he ring F 2 +uf 2 wih u 2 = 0, respecively, he laer resuls were generalized o F 2 +uf 2 + +u m 1 F 2 wih u m = 0 by Shi [12]. Siap [14] defined m-spoy Lee weigh and m-spoy Lee weigh enumeraor of bye error-conrol codes over Z 4 and derived a MacWilliams ideniy. Sharma e al. inroduced join m-spoy weigh enumeraors of wo bye error-conrol codes over he ring of inegers modulo l and over arbirary finie fields wih respec o m-spoy Hamming weigh [8], m-spoy Lee weigh [9] and r-fold join m-spoy weigh [10]. Özen and Siap [7] proved a MacWilliams ideniy for he m-spoy RT weigh enumeraors of binary codes, which was generalized o he case of finie commuaive Frobenius rings by Shi [11]. Bu MaWilliams ype ideniies for m-spoy Hamming (Lee) weigh enumeraors over finie commuaive Frobenius ring has no been considered o he bes of our knowledge. Throughou his paper, we le ring R k be a finie commuaive Frobenius ring or an infinie family of rings (see Example 2.4). The organizaion of his paper is as follows: In Secion 2, we sae some preliminaries which we need o prove our main resuls. Secion 3 presens a MacWilliams The paper was submied for reviewing on 30h March. This research is suppored by NNSF of China ( , ), Talens youh Fund of Anhui Province Universiies (2012SQRL020ZD). The auhor is wih he School of Mahemaical Sciences, Anhui Universiy, Anhui , China, Associae Professor. ( smjwcl.good@163.com). 1
2 ideniy for m-spoy Hamming weigh enumeraor over R k. Secion 4 and Secion 5 deermine MacWilliams ideniies for join m-spoy weigh enumeraor and spli m-spoy Hamming weigh enumeraor over R k, respecively. Finally, we presen a MacWilliams ideniy for m-spoy Lee weigh enumeraor over R k in Secion 6. We also illusrae our resuls wih some examples. 2 Preliminaries In his secion, we begin by giving some basic definiions ha we need o derive our resuls. Le R k be a finie commuaive Frobenius ring wih uniy and N be a posiive ineger. Le us recall some basic knowledge abou R k as described in [3]. The finie commuaive ring R k is called a Frobenius ring if R k is self-injecive (i.e., he regular module is injecive), or equivalenly, (C ) = C for any submodule C of any free R k -module Rk n, where C denoes he orhogonal submodule of C wih respec o he usual Euclidean inner produc on Rk n. Moreover, in his case, C = R k n for any submodule C of Rk n, where denoes he cardinaliy of C. This is one of he reasons why only finie Frobenius rings are suiable for coding alphabes. The reader may refer o [17,18] for more deails on Frobenius rings. Remark 2.1. Many well-known finie rings are finie Frobenius rings. Here are a number of examples of finie commuaive Frobenius rings wih heir generaing characers. (i) Le R k = F be a finie field. A generaing characer χ on R k is given by χ(x) = ξ T r(x), where ξ = e 2πi p and Tr : F l F p is he race funcion from F o F p. (ii) Le R k = Z l. Se ξ = e 2πi l. Then χ(x) = ξ x, x Z l, is a generaing characer. (iii) The finie direc sum of Frobenius rings is Frobenius. If R 1,, R n each has generaing characers χ 1,, χ n, hen R k = R i has generaing characer χ = χ i. (iv) A Galois ring R k = GR(p n, r) = Z p n[x]/ f is a Galois exension of Z p n of degree r, where f is a monic irreducible polynomial in Z p n[x] of degree r. Any elemen a of R k is represened by a unique polynomial r = r 1 a ix i, wih a i Z p n. Se ξ = e 2πi p n. Then χ(a) = ξ ar 1. (v) Le R k be a finie chain ring wih maximal ideal u and le is residue field R k / u be F p n, i.e, R k = F q +uf q + +u k 1 F q. Any elemen r of R k is represened by a unique polynomial r = r 1 a iu i, wih r i F q. Se ξ = e 2πi q. Then χr = ξ ar 1. Le (G, +) be a finie abelian group and V be a vecor space over he complex numbers. The se Ĝ of all characers of G forms an abelian group under poinwise miliplicaion. For any funcion f : G V, define is Fourier ransform ˆf : Ĝ V by f(π) = x G π(x)f(x), π Ĝ. Given a subgroup H G, define an annihilaor (Ĝ : H) = {π Ĝ : π(h) = 1}. Moreover, we have Ĝ : H) = G / H. The Poission summaion formula relaes he sums of a funcion over a subgroup o he sum of is Fourier ransform over he annihilaor of he subgroup. The following lemma can be found in [18], which plays an imporman role in deriving he MacWilliams ideniy for m-spoy Hamming weigh enumeraor. Lemma 2.2. (Poisson Summaion Formula) Le H G be a subgroup, and le f : G V be any funcion from G o a complex vecor space V. Then 1 f(x) = (Ĝ : H) x H π (Ĝ:H) f(π). 2
3 Hereinafer, codes will be aken o be of lengh N where N is a muliple of bye lengh b, i.e. N = nb. Le c = (c 1, c 2,, c N ) and v = (v 1, v 2,, v N ) be wo elemens of Rk N. The inner produc of c and v, denoed by c, v, is defined as follows: Here, c i, v i = b j=1 c, v = n c i, v i = n ( b c i,j v i,j ). j=1 c i,j v i,j denoes he inner produc of c i and v i, respecively. Le C be a linear code over Rk N. The se C = {v Rk N u, v = 0, for all u C} is also a linear code over R k and i is called he dual code of C. Remark 2.3. The following is an example of a ring ha is a no a chain ring bu a finie communiaive Frobenius ring. We will use his ring o exhibi several of he resuls of he paper. Example 2.4. Le R k = F 2 [u 1, u 2,, u k ]/ u 2 i = 0, u iu j = u j u i. When k = 1, R1 = F 2 + uf 2 is a principal ideal ring. When k = 2, he ring is R 2 = F 2 +uf 2 +vf 2 +uvf 2 is a nonprincipal ideal ring and we will ofen use R 2 in he following examples. More deails abou R k can be found in [1]. The ring can also be defined recursively. Le R k = R k 1 [u k ]/ u 2 k = 0, u ku j = u j u k = Rk 1 + ur k 1. For any subse A {1, 2,, k} we will fix u A := i A u i wih he convenion ha u φ = 1. Then any elemen of R k can be represened as A {1,2,,k} c A u A, c A F 2. Since (c A ) can be hough of as a binary vecor of lengh 2 k. Le w(c A ) be he Hamming weigh of his vecor. Then χ(r k ) = ( 1) w(c A). Throughou his paper, we adop he noaions R k = l unless oherwise saed, i.e, denoe he size of finie commuaive Frobenius ring R k by l. In Example 2.4, we have l = 2 2k. 3 MacWilliams ype ideniy for m-spoy Hamming enumeraor over finie commuaive Frobenius rings In his secion, we exend he resuls in [6] and [13] o he case over finie commuaive Frobenius rings. Le us begin wih some definiions. Definiion 3.1 (see [15]). A spoy bye error is defined as or fewer bis errors wihin a b-bi bye, where 1 b. When none of he bis in a bye is in error, we say ha no spoy bye error has occurred. We can define he m-spoy weigh and he m-spoy disance over R k as follows. Definiion 3.2. Le e Rk N be an error vecor and e i Rk b be he i-h bye of e, where N = nb and 1 i n. The number of /b-errors in e, denoed by w M (e), and called m-spoy Hamming weigh is defined as w M (e) = n, where x denoes he ceiling of x for any real number i=0 wm (e i) x, i.e., he smalles ineger number greaer han or equal o x. If = 1, his weigh, defined by w M, is equal o he Hamming weigh. In a similar way, we define he m-spoy disance of wo codewords u and v as d M = n. Furher, i is also sraighforward o show ha his dh (u i,v i) 3
4 disance is a meric in R N k. Definiion 3.3. Le v = (v 1, v 2,, v b ) Rk b. Then he suppor of v is defined by supp(v)= {i v i 0} and he complemen of supp(v) is denoed supp(v). Definiion 3.4. Le c = (c 1, c 2,, c b ) Rk b and define S p (c) = {v R b k supp(v) supp(c) and p = supp(v) } and S p (c) = {v R b k supp(v) supp(c) and p = supp(v) }. The following lemmas will be needed laer when we are ready o prove our main heorem in his secion. Lemma 3.5. Le H 0 be an ideal of R k, a R k. Then we have r R k χ(ar) = { l, if a = 0, 0, if a 0. a H χ(a) = 0 and Proof. We can obain he firs asserion readily by using he definiion of characer χ. If a = 0, hen clearly χ(ar) = 1 for all r R k and hence he resul follows. Oherwise, if a is a uni, hen elemens ar, for all r R k, run over all elemens of R k, which forms a rivial ideal R k. If a is a zero divisor, hen elemens ar, for all r R k, form a proper ideal of R k. Hence, according o he firs asserion in his Lemma, if a 0, we have χ(ar) = 0. r R k Lemma 3.6. Le v = (v 1, v 2,, v b ) Rk b wih w(c) = j 0 and p {1, 2,, j}. Then χ( c, v ) = 0. 0 w(v) p supp(v) supp(c) Proof. Le {l 1, l 2,, l p } supp(c). If we define a map ϕ : R p k R k such ha ϕ(v 1, v 2,, v p ) = c l1 v c lp v p. This is a group homomorphism and he image Im(ϕ) = H is no zero since w(c) 0. Furher, H is he nonzero subgroup of R k generaed by {c l1,, c lp }. Thus, by applying he firs group isomorphism heorem, R p k / ker(ϕ) = H {0}. Le ker(ϕ) = m. ( p ) χ( c, v ) = χ c li v li = m χ(h) = 0. h H 0 w(v) p supp(v) supp(c) This proves he Lemma. (v l1,,v lp ) Similar o [12], applying he mehod of mahemaical inducion, we have he follwing lemma. Lemma 3.7. Le c = (c 1, c 2,, c b ) Rk b and w(c) 0. For all p posiive inegers, we le I p = {i 1, i 2,, i p } supp(c) and I 0 = ø. Then we have v R b k supp(v)=ip χ( c, v ) = ( 1) p. Lemma 3.8. Le c = (c 1, c 2,, c b ) Rk b and w(c) = j 0. For all 0 p j, we have ( ) j ( ) b j (i) χ( c, v ) = ( 1) p ; (ii) χ( c, v ) = (l 1) p. p p v S p(c) v S p(c) 4
5 Proof. According o Definiion 3.4 and Lemma 3.7, we ge v S p(c) χ( c, v ) = I p supp(c) supp(v)=i p χ( c, v ) = I p supp(c) ( ) j ( 1) p = ( 1) p. p Since v S p (c) wih supp(v) supp(c), we have χ( c, v ) = 1. Furher, since p = supp(v), here are ( ) b j p ways of choosing a subse of size p from he complemen of suppor of c of size p. For each subse of size p, he sum of characers equals o (l 1) p. This proves he resul. Following Lemma 3.8, we have he following corollary. Corollary 3.9. Le c = (c 1, c 2,, c b ) R b k and w(c) = j, 0 j 1 j and 0 j 2 b j. If S j1,j 2 (c) = { v R b k j 1 = supp(v) supp(c) and j 2 = supp(v) supp(c) }, hen v s j1,j 2 (c) ( )( ) j b j χ( c, v ) = ( 1) j1 (l 1) j2. j 1 j 2 Lemma Le c = (c 1, c 2,, c b ) Rk b and w(c) = j. Then v R b k Proof. Since he sum χ( c, v )z w M (v)/ = v R b k j b j ( )( ) j b j ( 1) j1 (l 1) j2 z (j1+j2)/. j 1 j 1=0 j 2=0 χ( c, v )z w M (v)/ runs over all v Rk b, we can spli he sum according o he se S j1,j 2 where j 1 and j 2 run hrough all possible cases. Hence he conclusion of his lemma follows from Corollary 3.9. Le α j = #{i : w(c i ) = j, 1 i n}. Tha is, α j is he number of byes having Hamming weigh j, 0 j b, in a codeword. The summaion of α 0, α 1,, α b is equal o he code lengh in b byes, ha is α j = n. The Hamming weigh disribuion vecor (α 0, α 1,, α b ) is deermined j=0 uniquely for he codeword c. Then, he m-spoy Hamming weigh of he codeword c is expressed as w M (c) = b j=0 j/ α j. Le A (α0,α 1,,α b ) be he number of codewords wih Hamming weigh disribuion vecor (α 0, α 1,, α b ). For example, le c = (0, u, 0, v, 0, u+v, 1, u, 1+u+uv, 0, 0, 0, 1+ u + v + uv, u, 0) be a codeword over R 2 as saed in Example 2.4 wih bye b = 3 and n = 4. Then he Hamming weigh disribuion vecor of he codeword is (α 0, α 1, α 2, α 3 ) = (1, 1, 2, 1). Therefore, A (1,1,2,1) is he number of codewords wih Hamming weigh disribuion vecor (1, 1, 2, 1). We are now ready o define he m-spoy Hamming weigh enumeraor of a bye error conrol code over R k. Definiion The Hamming weigh enumeraor for m-spoy bye error conrol code C is defined as W (z) = c C z w M (c). j 2 By using he parameer A (α0,α 1,,α b ), which denoes he number of codewords wih Hamming weigh disribuion vecor {α 0, α 1,, α b }, W (z) can be expressed as follows: W (z) = A (α0,...,α b ) (α 0,...,α b ) j=0 α 0,...,α b 0 α 0+ +α b =n b (z j/ ) αj. 5
6 Theorem Le C be a bye error conrol code over R k. The relaion beween he m-spoy /b-weigh enumeraors of C and is dual is given by W (z) = where ϑ (b,l) j (z) = j A (α 0,...,α b ) (α 0,...,α b ) j=0 α 0,...,α b 0 α 0+ +α b =n b j j 1=0 j 2=0 ( 1) j1 (l 1) j2 ( j b (z j/ ) αj = 1 j 1 )( b j j 2 ) z (j 1+j 2)/. (α 0,...,α b ) α 0,...,α b 0 α 0+ +α b =n b A (α0,...,α b ) (ϑ (b,l) j=0 j (z)) αj, Proof. Given a linear code C R n k, we apply he Poisson Summaion Formula wih G = Rn k, H = C, and V = C[z], he polynomial ring over C in one indeerminae. The firs ask is o idenify he characer-heoreic annihilaor (Ĝ : H) = ( R k n : C) wih C. Le ρ be a generaing characer of R k. We use ρ o define a homomorphism β : R k R k. For r R k, he characer β(r) R k has he form β(r)(s) = (rρ)(s) = ρ(sr) for s R k. One can verify ha β is an isomorphism of R k -modules. In paricular, w(r) =w(βr), where w(r) = 0 for r = 0, and w(r) 0 for r 0. Exend β o an isomorphism β : R n k R k n of Rk -modules, via β(x)(y) = ρ(yx), for x, y R n k. Again, w(x) = w(βx). For x R n k, β(x) ( R k : C) means β(x)(c) = β(c x) = 1. This means ha he ideal C x of R k is conained in ker(ρ). Because ρ is a generaing characer, which implies ha C x = 0. Thus x C. The converse is obvious. Thus C corresponds o ( R k : C) under he isomorphism β. Remember ha β : R k n R k n is an isomorphism of Rk -modules and (C ) = C. Thus he Poisson Summaion Formula becomes where he Fourier ransform is v C f(v) = 1 f(c) = v R N k f(c), (1) c C Le f(v) = z w M (v). Then he funcion f(c) is calculaed as follows: f(c) = χ( c, v )z w M (v) v R nb k = = v 1 Rk b v 2 Rk b v i R b k v n R b k n χ( c i, v i )z w H(v i)/. χ c (v)f(v). (2) χ( c 1, v 1 )χ( c 2, v 2 ) χ( c n, v n ) By applying Corollary 3.9, we have, n k i b k i ( )( ) f(c) = ki b ki ( 1) j1 (l 1) j2 where k i = w(c i ). Thus b f(c) = j=0 j 1=0 j 2=0 j j 1=0 j 2=0 j 1 j 2 b j ( )( ) j b j ( 1) j1 (l 1) j2 j 1 where α j (c) = {i w(c i ) = j}. n j b j ( )( ) f(c) = j b j ( 1) j1 (l 1) j2 j 1 j 1=0 j 2=0 6 j 2 j 2 n z (j1+j2)/ z (j1+j2)/ z (j1+j2)/ z w H(v i)/, α j(c) α j(c),.
7 Afer rearranging he summaions on boh sides according o he weigh disribuion vecors of codewords in C and C respecively, we have he resul W (z) = A (α 0,...,α b ) (α 0,...,α b ) j=0 α 0,...,α b 0 α 0+ +α b =n b (z j/ ) αj = 1 (α 0,...,α b ) α 0,...,α b 0 α 0+ +α b =n b A (α0,...,α b ) (ϑ (b,l) j=0 j (z)) αj. Example Le C be he bye error-conrol code over R 2 as saed in Example 2.4 generaed by (1, 0, 0, u, v, 1 + u), (0, u, 0, u + v, uv, u), (uv, 0, uv, uv, 0, uv). This code has ype (16) 1 (8) 1 (2) 1 and hence = 256. The dual code of C is a bye error-conrol code of lengh 6 over R 2 and i has 16 4 = codewords. The Hamming weigh disribuion vecors of he codewords of C, he number of codewords, and polynomials ϑ (3,16) j (z) for b = 3 and = 2 are shown in Tables I and II for he necessary compuaions o apply Theorem Table I Hamming weigh disribuion vecors of he codewords in C and he number of codewords. (α 0, α 1, α 2, α 3) number (2, 0, 0, 0) 1 (0, 2, 0, 0) 5 (0, 0, 2, 0) 26 (0, 0, 0, 2) 64 (1, 1, 0, 0) 2 (1, 0, 1, 0) 1 (1, 0, 0, 1) 1 (0, 1, 1, 0) 19 (0, 1, 0, 1) 31 (0, 0, 1, 1) 106 Table II Polynomials ϑ (3,16) j (z) for = 2, b = 3 and l = 16. ϑ (3,16) 0 (z) = z z 2 ϑ (3,16) 1 (z) = z 225z 2 ϑ (3,16) 2 (z) = 1 16z + 15z 2 ϑ (3,16) 3 (z) = 1 z 2 According o he expression of W (z) and Table I, we obain he m-spoy Hamming weigh enumeraor of C as W (z) = z + 183z z z 6. By applying Theorem 3.12 and Table II, we obain (here for convenience, we wrie ϑ (b,l) j (z) = ϑ j (z)) W (z) = 1 A (α0,α 1,α 2,α 3) α 0+α 1+α 2+α 3=2 j=0 3 (ϑ j (z)) αj = 1 [ (ϑ0 (z)) 2 + 5(ϑ 1 (z)) (ϑ 2 (z)) (ϑ 3 (z)) 2 + 2ϑ 0 (z)ϑ 1 (z) + ϑ 0 (z)ϑ 2 (z) 256 +ϑ 0 (z)ϑ 3 (z) + 19ϑ 1 (z)ϑ 2 (z) + 106ϑ 2 (z)ϑ 3 (z) + 31ϑ 1 (z)ϑ 3 (z) ] = z z z z 4. 4 MaWillians ype ideniy for join m-spoy Hamming weigh enumeraor over finie commuaive Frobenius rings 7
8 Sharma e al. defined and sudied join m-spoy Hamming weigh enumeraor for a pair of bye error-conrol codes over he ring of inegers modulo l (l is an ineger) and over arbirary finie fields in [8]. In his secion, we enend heir resuls o arbirary finie commuaive Frobenius rings. Lemma 4.1. Le be a fixed posiive ineger, and a, b be arbirary nonnegaive inegers. If ā and b, respecively, are he leas nonnegaive residues of a and b modulo, hen we have a + b = a a a + b, if ā + b = 0; + b + 1, if 0 < ā + b ; + b + 2, if < ā + b 2 2, where x denoes he floor of x for any real number x, i.e., he smalles ineger number less han or equal o x. Proof. The proof is rivial. Definiion 4.2. Define he funcions f 01, f 10 and f 11 for each pair of vecors u = (u 1, u 2,, u b ), v = (v 1, v 2,, v b ) in Rb k, as follows: f 01 is he number of j s such ha u j = 0 and v j 0; f 10 is he number of j s such ha u j 0 and v j = 0; f 11 is he number of j s such ha u j 0 and v j 0; Noe ha for each u, v R b k, hen f 10(u, v )+f 11 (u, v ) = w H (u ), f 01 (u, v )+f 11 (u, v ) = w H (v ) where w H (u ) and w H (v ) are he Hamming weighs of u and v, respecively. Definiion 4.3. We define he funcions J, K, L: Rk b Rb k Z as follows: f01(u,v ) J(u, v, if f 01 (u, v ) + f 11 (u, v ) = 0; ) = f01(u,v ) + 1, if 0 < f 01 (u, v ) + f 11 (u, v ) ; f01(u,v ) + 2, if < f 01 (u, v ) + f 11 (u, v ) 2 2, f10(u,v ) K(u, v, if f 10 (u, v ) + f 11 (u, v ) = 0; ) = f10(u,v ) + 1, if 0 < f 10 (u, v ) + f 11 (u, v ) ; f10(u,v ) + 2, if < f 10 (u, v ) + f 11 (u, v ) 2 2, L(u, v f11 (u, v ) ) = for every u, v R b k. Applying Lemma 4.1, i is easy o see ha J(u, v ) + L(u, v f01 (u, v ) + f 11 (u, v ) wh (v ) ) = = = w M (v ) and K(u, v ) + L(u, v f10 (u, v ) + f 11 (u, v ) wh (u ) ) = = = w M (u ) From he disscussion above, we can easily ge he following proposiion. Proposiion 4.4. There exis funcions: J, K, L : R bn k Rbn k J(u, v) + L(u, v) = w M (v), K(u, v) + L(u, v) = w M (u) Z, saisfying he following: for all u = (u 1, u 2,, u n ), v = (v 1, v 2,, v n ) R bn k wih u i s and v i s in R b k. Now we are ready o define join m-spoy Hamming weigh enumeraor for a pair of bye error-conrol codes over R k. 8
9 Definiion 4.5. Le C and D be bye error-conrol codes of lengh bn and bye lengh b over R k. Then he join m-spoy Hamming weigh enumeraor of he codes C and D is defined as J (C,D) (x, y, z) = x J(u,v) y K(u,v) z L(u,v). u C v D The following heorem shows ha he join m-spoy weigh enumeraor generalizes m-spoy weigh neumeraor jus like he join probabiliy densiy funcion generalizes single probabiliy densiy funcion. Theorem 4.6. The join m-spoy Hamming weigh enumeraor J C,D (x, y, z) of bye error-conrol codes C and D over R k saisfies he following properies: (i) J (C,D) (1, 1, 1) = D, (ii) J (D,C) (x, y, z) = J (C,D) (y, x, z), (iii) W C (z) = 1 D J (C,D)(1, z, z), where W C (z) is he m-spoy Hamming weigh enumeraor of C, (iv) W D (z) = 1 J (C,D)(z, 1, z), where W D (z) is he m-spoy Hamming weigh enumeraor of D. Proof. The proof is similar o ha of Theorem 12 in [8]. For our purpose, we need he following definiions. Definiion 4.7. Le, ν, µ be he inegers saisfying 1 b and 0 ν, µ b, and le δ be an ineger saisfying ν + µ b δ min{ν, µ}. For an ineger p (0 p b), le A p be he se of all 4-uple α = (α 1, α 2, α 3, α 4 ) of nonnegaive inegers α i s saisfying α 1 + α 2 + α 3 + α 4 = p wih 0 α 1 δ, 0 α 2 µ δ, 0 α 3 ν δ, 0 α 4 b + δ ν δ. Then we define he polynomial G δ ν,µ(x, y, z) as b p=0 p g p (α)x µ α 1 α 2 +θ (α) p y p α 1 α 2 +η (α) p z α 1 +α 2 where for each p (0 p b), he summaion runs over he se A p ; and furher for each α A p, p he coefficien g p (α) is given by ( )( )( )( ) δ µ δ ν δ b + δ µ ν ( 1) α1+α3 (l 1) p α1 α2. α 1 and he number θ p (α), η p (α) α 2 α 3 α 4 are given by 0, if µ α 1 α 2 + α 1 + α 2 ; 1, if 0 < µ α 1 α 2 + α 1 + α 2 ; 2, if < µ α 1 α 2 + α 1 + α 2 2 2, 0, if p α 1 α 2 + α 1 + α 2 ; 1, if 0 < p α 1 α 2 + α 1 + α 2 ; 2, if < p α 1 α 2 + α 1 + α 2 2 2, θ (α) p = η (α) p = Definiion 4.8. For each a Z 4 2, le [a] i (1 i b) denoe he i-h componen of a. Then for any 4-uple (l 1, l 2, l 3, l 4 ) over he se {0, 1, }, we define T l1l 2l 3l 4 as he se of all 4-uple a Z 4 2 saisfing [a] i = l i if l i is eiher 0 or 1; and [a] i runs over Z 2 if l i =. Definiion 4.9. Le (1 b) be an ineger and le µ, ν, δ be he inegers saisfying 0 µ, ν, δ b. For inegers p, q(0 p, q b), le B pq be he se of all uples α = (α a : a Z 4 2) of nonnegaive inegers α a s saisfying he following: α a = δ, α a = ν, α a = µ, α a = b, α a = p, α a = q. a T 1 1 a T 1 a T 1 a T 1 a T 1 9 a Z 4 2
10 Then we define he polynomial H (δ) µ,ν(x, y, z) as b p,q=0 p,q h pq (α)x q ψ pq (α) +ζ (α) pq y p ψ pq (α) +ω (α) pq z ψ pq (α), where for each p, q(0 p, q b), he summaion p,q runs over he se B pq ; and furher for each uple α B pq, he coefficien h pq (α) is given by wih φ pq (α) = α a + a T 11 δ!(ν δ)!(µ δ)!(b + δ ν µ)! ( 1) φ(α) pq (l 1) p+q φ pq(α) α a! a Z 4 2 α a, ψ pq (α) = a T 11 ζ (α) pq = ω (α) pq = a T 11 α a and he numbers 0, if q ψ pq (α) 1, if 0 < q ψ pq (α) 2, if < q ψ (α) + ψ (α) pq ; pq 0, if p ψ pq (α) 1, if 0 < p ψ pq (α) 2, if < p ψ (α) + ψ (α) pq ; + ψ (α) pq 2 2, + ψ (α) pq ; pq + ψ (α) pq ; + ψ (α) pq 2 2, If, for 1 i n, j i is he Hamming weigh of i-h bye u i = (u i1, u i2,, u ib ) of he vecor u = (u 1, u 2,, u n ) Rk bn, hen he vecor (j 1, j 2,, j n ) is called he Hamming weigh disribuion vecor of u and is denoed by w D (u). Le j = (j 1, j 2,, j n ), k = (k 1, k 2,, k n ) and δ = (δ 1, δ 2,, δ n ) be he Hamming weigh disribuion vecors of u, v and w, where u, v, w Rk bn and 0 j i, k i, δ i b for each i, we define he polynomials G (δ) (x, y, z) = n G (δi) j i,k i (x, y, z), H (δ) (x, y, z) = n H (δi) j i,k i (x, y, z). We also define j k = (j 1 k 1, j 2 k 2,, j n k n ), where j i k i = min{j i, k i } for each i. Furher, le v = (v 1, v 2,, v n ) where v i = (v i1, v i2,, v ib ) Rk b. Then we define a vecor u v Zbn 2 as u v = (u 1 v 1, u 2 v 2,, u n v n ), where for each i, u i v i = (u i1 v i1, u i2 v i2,, u ib v ib ) wih each u ij v ij given by { 1 if u ij 0 and v ij 0; u ij v ij = 0 ohwise i is easy o see ha 0 w H (u i v i ) j i k i for each i, so ha w D (u v) varies from 0 o j k. Theorem Le C and D be bye error-conrol codes of lengh bn and bye lengh b over R k. If A δ (j; k) is he number of pairs (u, v) of codewords u C and v D having w D (u) = j, w D (v) = k and w D (u v) = δ, hen we have (i) J C,D(x, y, z) = 1 (ii) J C,D (x, y, z) = 1 D j k δ=0 δ=0 1 (iii) J C,D (x, y, z) = D j k A δ (j; k)g (δ) (x, y, z), A δ (j; k)g (δ) k,j (y, x, z), j k δ=0 A δ (j; k)h (δ) (y, x, z), 10 (3) (4)
11 where he summaion runs over all n-uples j = (j 1, j 2,, j n ) and k = (k 1, k 2,, k n ) saisfying 0 j i, k i b, and he polynomials G (δ) (x, y, z) s and H(δ) (x, y, z) s are defined in Definiion 4.9. Proof. The proof is similar o hose of Theorem 3.12 and Theorem 20 in [8]. Example Le C be he bye error-conrol code over R 2 generaed by he se {(1, 0, 0, u, v, 1, 0, 0, u), (0, 0, uv, uv, 0, 0, 0, uv, uv)}. Is lengh is 9 and bye lengh is 3. I is easy o check ha he generaors are independen, hence he code has ype (16) 1 (2) 1 and = 32. Is dual code C, which is also a bye error-conrol code over R 2 of lengh 9, conains = codewords. Le D be a linear code of lengh 9 and bye lengh 3, generaed by (0, 0, uv, uv, 0, 0, 0, uv, uv). Since C = is large and D = 2 is small, we apply Theorem 4.10 (i) o obain join m-spoy weigh enumeraor of he codes C and D. For his, we need o compue Hamming weigh disribuion vecors of he codewords in C, which are given in Table IV. I is easy o see ha he codewords u = (1, 0, 0, u, v, 1, 0, 0, u) C and he unique nonzero v = (uv, 0, uv, 0, uv, 0, 0, 0, uv) D having Hamming weigh disribuion vecors as j = (1, 3, 1) and k = (2, 1, 1), respecively, have δ = (1, 1, 1) and hey conribue G (δ) (x, y, z) = G(1) 1,2 (x, y, z)g(1) (x, y, z)g(1) (x, y, z) o he join m-spoy Hamming weigh enumeraor, where by Definiion 4.7, G (1) 1,2 (x, y, z) = x+239xy 225yz 15z, G(1) 3,1 (x, y, z) = x xy2 and G (1) 1,1 (x, y, z) = x+224xy 225xy2. Working in a similar way, we obain he conribuing polynomials for each riple of j, k and δ, which are given in Table III (here for convenience, we wrie G (δ) (x, y, z) = G(δ) ). Now by Theorem 4.10 (i), he join m-spoy Hamming weigh enumeraor of C and D is given by J C,D(x, y, z) = 1 j k δ=0 A δ (j; k)g (δ) (x, y, z) 3,1 = x 3 y x 3 y x 3 y x 3 y x 3 y + x x 2 y 5 z x 2 y 4 z x 2 y 3 z x 2 y 2 z +7715x 2 yz y y y y y y ,1 5 MaWillians ype ideniy for spli m-spoy Hamming weigh enumeraor over Finie commuaive Frobenius rings In his secion, we prove ha he resuls in [8] sill hold over arbirary finie commuaive Frobenius rings. We firs recall spli m-spoy Hamming weigh enumeraor for a bye error-conrol code over R k as follows: Definiion 5.1. Le C be a bye error-conrol code of lengh bn over R k wih bye lengh b. Then he spli m-spoy Hamming weigh enumeraor of he code C, denoed by S C (x i, y i : i = 1, 2,, n), is defined as ( n ) x b/ w M (u i) i y w M (u i) i. (u 1,u 2,,u n) C We recall ha if j i (1 i n) is he Hamming weigh of he i-h bye u i of u = (u 1, u 2,, u n ), hen he vecor (j 1, j 2,, j n ) is called he Hamming weigh disribuion vecor of u. If A(j 1, j 2,, j n ) denoes he number of codewords in C having Hamming weigh disribuion vecor as 11
12 j k δ A δ (j, k) G (δ) (x, y, z) (0, 0, 0) (0, 0, 0) (0, 0, 0) 1 G (0) 0,0 G(0) 0,0 G(0) 0,0 (0, 0, 0) (2, 1, 1) (0, 0, 0) 1 G (0) 0,2 G(0) 0,1 G(0) 0,1 (1, 1, 0) (0, 0, 0) (0, 0, 0) 1 G (0) 1,0 G(0) 1,0 G(0) 0,0 (1, 1, 0) (2, 1, 1) (1, 0, 0) 1 G (1) 1,2 G(0) 1,1 G(0) 0,1 (1, 1, 2) (0, 0, 0) (0, 0, 0) 1 G (0) 1,0 G(0) 1,0 G(0) 2,0 (1, 1, 2) (2, 1, 1) (1, 0, 1) 1 G (1) 1,2 G(0) 1,1 G(1) 2,1 (1, 2, 0) (0, 0, 0) (0, 0, 0) 2 G (0) 1,0 G(0) 2,0 G(0) 0,0 (1, 2, 0) (2, 1, 1) (1, 1, 0) 2 G (1) 1,2 G(1) 2,1 G(0) 0,1 (1, 2, 1) (0, 0, 0) (0, 0, 0) 2 G (0) 1,0 G(0) 2,0 G(0) 1,0 (1, 2, 1) (2, 1, 1) (1, 0, 1) 2 G (1) 1,2 G(0) 2,1 G(1) 1,1 (1, 3, 1) (0, 0, 0) (0, 0, 0) 10 G (0) 1,0 G(0) 3,0 G(0) 1,0 (1, 3, 1) (2, 1, 1) (1, 1, 1) 10 G (1) 1,2 G(1) 3,1 G(1) 1,1 (2, 1, 1) (0, 0, 0) (0, 0, 0) 2 G (0) 2,0 G(0) 1,0 G(0) 1,0 (2, 1, 1) (2, 1, 1) (2, 0, 0) 2 G (2) 2,2 G(0) 1,1 G(0) 1,1 (2, 2, 1) (0, 0, 0) (0, 0, 0) 2 G (0) 2,0 G(0) 2,0 G(0) 1,0 (2, 2, 1) (2, 1, 1) (2, 1, 0) 2 G (2) 2,2 G(1) 2,1 G(0) 1,1 (2, 2, 2) (0, 0, 0) (0, 0, 0) 1 G (0) 2,0 G(0) 2,0 G(0) 2,0 (2, 2, 2) (2, 1, 1) (2, 0, 1) 1 G (2) 2,2 G(0) 2,1 G(1) 2,1 (2, 3, 2) (0, 0, 0) (0, 0, 0) 10 G (0) 2,0 G(0) 3,0 G(0) 2,0 (2, 3, 2) (2, 1, 1) (2, 1, 1) 10 G (2) 2,2 G(1) 3,1 G(1) 2,1 Table III Conribuing polynomials o he m-spoy Hamming weigh enumeraor G (0) 0,0 = y y2, G (0) 0,1 = x + 720xy xy2, = x + 495xy + 225z yz, G (0) 1,0 = y 225y2, G (0) 1,1 = G(1) 1,1 = x + 224xy 225xy2, G (0) 0,2 G (1) 1,2 = x + 239xy 225yz 15z, G (0) 2,0 = 1 16y + 15y2, G (0) 2,1 = G(1) G (2) 2,2 2,1 = x 16xy + 15xy2, = x + z + 15yz 17xy, G (0) 3,0 = 1 y2, G (1) 3,1 = x xy2. (j 1, j 2,, j n ), hen he spli m-spoy Hamming weigh enumeraor S C (x i, y i : i = 1, 2,, n) of he code C can be rewrien as (u 1,u 2,,u n) C A(j 1, j 2,, j n ) n x b/ ji/ i y ji/ i, where he summaion runs over all n-uples (j 1, j 2,, j n ) saisfying 0 j i b for each i, 1 i n. Theorem 5.2. Le C be a bye error-conrol code of lengh bn over R k wih bye lengh b and spli m-spoy Hamming weigh enumeraor S C (x i, y i : i = 1, 2,, n). Then he spli m-spoy Hamming weigh enumeraor of he dual code C over R k is given by S C (x i, y i : i = 1, 2,, n) = 1 (j 1,j 2,,j n) A(j 1, j 2,, j n ) n g () j i (x i, y i ), where he summaion runs over all n-uples (j 1, j 2,, j n ) saisfying 0 j i b for 1 i n, and he polynomials g () j i (x i, y i ) are definied by g () j i (x i, y i ) = where for each p, he polynomial K p (j i ) = b K p (j i )x b/ p/ y p/, (5) p=0 p a=0 ( 1) a (l 1) p a( j i a )( b ji polynomial. (Here, we assume ha ( e f) = 0 when f < 0 or f > e.) Proof. The proof is similar o hose of Theorem 3.12 and Theorem 25 in [8]. p a) is he well-known Krawchouk 12
13 Theorem 5.3. Le C, D be bye error-conrol codes of lengh bn over R k wih bye lengh b and m-spoy Hamming weigh enumeraor W C (z), W D (z) and spli m-spoy Hamming weigh enumeraors S C (x i, y i : i = 1, 2,, n), S D (x i, y i : i = 1, 2,, n), respecively. Then (i) he direc sum C D = (u v : u C, v D) has m-spoy Hamming weigh enumeraor W C (z)w D (z) and spli m-spoy Hamming weigh enumeraor S C (x i, y i : i = 1, 2,, n)s D (X i, Y i : i = 1, 2,, n). (ii) assuming n even, he code C D = {(u v u v ) : u = (u u ) C, v = (v v ) D} (where u and v have each been broken ino wo equal halves) has m-spoy Hamming weigh enumeraor W C (z)w D (z) and spli m-spoy Hamming weigh enumeraor S C (x i, y i ; X i, Y i : i = 1, 2,, n/2)s D (x i, y i ; X i, Y i : i = (n/2) + 1,, n). Proof. The proof is similar o ha of Theorem 28 in [8]. Example 5.4. Le C be he bye error-conrol code as defined in Example Here we apply Theorem 5.2 o compue spli m-spoy Hamming weigh enumeraor of he code C. For his, firs we need o compue he Hamming weigh disribuion vecors for he codewords of C. I is easy o see ha he codeword (1, 0, 0, u, v, 1, 0, 0, u) C has Hamming weigh disribuion vecor as (1, 3, 1) and i conribues he polynomial g (2) o he spli m-spoy Hamming weigh enumeraor, where by (5), we have g (2) 1 (x i, y i ) = x 2 i + 224x iy i 225yi 2, g(2) 3 (x i, y i ) = x 2 i y2 i for each i. Working similarly, we obain he Hamming weigh disribuion vecor and he conribuing polynomials for oher codewords in C, which are given in Table IV. Therefore by Theorem 5.2, he spli m-spoy Hamming weigh enumeraor of he code C is given by S C (x i, y i : i = 1, 2, 3) = 1 3 (j 1,j 2,j 3) g (2) j i (x i, y i ) = 2x 2 1x 2 2x x 2 1x 2 2x 3 y x 2 1x 2 2y x 2 1x 2 y 2 x x 2 1x 2 y 2 x 3 y x 2 1x 2 y 2 y x 2 1y 2 2x x 2 1y 2 2x 3 y x 2 1y 2 2y x 1 y 1 x 2 2x x 1 y 1 x 2 2x 3 y x 1 y 1 x 2 2y x 1 y 1 x 2 y 2 x x 1 y 1 x 2 y 2 x 3 y x 1 y 1 x 2 y 2 y x 1 y 1 y 2 2x x 1 y 1 y 2 2x 3 y x 1 y 1 y 2 2y y 2 1x 2 2x 3 y y 2 1x 2 2y y 2 1x 2 y 2 x y 2 1x 2 y 2 x 3 y y 2 1x 2 y 2 y y 2 1y 2 2x y 2 1y 2 2x 3 y y 2 1y 2 2y MacWilliams ype ideniy for m-spoy Lee weigh enumeraor over an infinie family of rings In his secion, we concenrae our sudy on m-spoy Lee weigh enumeraor for bye errorconrol codes over R k = R k 1 [u k ]/ u 2 k = 0, u ku j = u j u k. We prove ha he resuls in [9] are sill valid over R k. For his, we firs recall he definiion of Lee weighs in R k as follows: Definiion 6.1. For any subse A {1, 2,, k}, he Lee weigh of u A is defined by w L (u A ) = 2 A. In R k, here are precisely ( ) 2 k i elemens of Lee weigh i, for i = 0, 1,, 2 k. For example, consider R 2 = F 2 + uf 2 + vf 2 + uvf 2, he Lee weigh of elemens 1, 1 + u, 1 + v and 1 + u + v + uv is 1; of elemens u, v, u + v, u + uv, v + uv and u + v + uv is 2; of elemens 1 + uv, 1 + u + uv, 1 + v + uv and 1 + u + v is 3; of elemen uv is 4; of elemen 0 is 0. 13
14 Table IV Conribuing polynomials of he codewords codewords of C (j 1, j 2, j 3 ) g (2) j 1 (x 1, y 1 )g (2) j 2 (x 2, y 2 )g (2) j 3 (x 3, y 3 ) (0, 0, 0, 0, 0, 0, 0, 0, 0) (0, 0, 0) g (2) 0 (x 1, y 1 )g (2) 0 (x 2, y 2 )g (2) 0 (x 3, y 3 ) (8, 0, 0, 0, 0, 8, 0, 0, 0) (1, 1, 0) g (2) 1 (x 2, y 2 )g (2) 0 (x 3, y 3 ) (0, 0, 8, 8, 0, 0, 0, 8, 8) (1, 1, 2) g (2) 1 (x 2, y 2 )g (2) (2, 0, 0, 0, 8, 2, 0, 0, 0) (1, 2, 0) g (2) 2 (x 2, y 2 )g (2) 0 (x 3, y 3 ) (10, 0, 0, 0, 8, 10, 0, 0, 0) (1, 2, 0) g (2) 2 (x 2, y 2 )g (2) 0 (x 3, y 3 ) (4, 0, 0, 8, 0, 4, 0, 0, 8) (1, 2, 1) g (2) 2 (x 2, y 2 )g (2) (12, 0, 0, 8, 0, 12, 0, 0, 8) (1, 2, 1) g (2) 2 (x 2, y 2 )g (2) (1, 0, 0, 2, 4, 1, 0, 0, 2) (1, 3, 1) g (2) (3, 0, 0, 2, 12, 3, 0, 0, 2) (1, 3, 1) g (2) (5, 0, 0, 10, 4, 5, 0, 0, 10) (1, 3, 1) g (2) (6, 0, 0, 8, 8, 6, 0, 0, 8) (1, 3, 1) g (2) (7, 0, 0, 10, 12, 7, 0, 0, 10) (1, 3, 1) g (2) (9, 0, 0, 2, 4, 9, 0, 0, 2) (1, 3, 1) g (2) (11, 0, 0, 2, 12, 11, 0, 0, 2) (1, 3, 1) g (2) (13, 0, 0, 10, 4, 13, 0, 0, 10) (1, 3, 1) g (2) (14, 0, 0, 8, 8, 14, 0, 0, 8) (1, 3, 1) g (2) (15, 0, 0, 10, 12, 15, 0, 0, 10) (1, 3, 1) g (2) (4, 0, 8, 0, 0, 4, 0, 8, 0) (2, 1, 1) g (2) 1 (x 2, y 2 )g (2) (12, 0, 8, 0, 0, 12, 0, 8, 0) (2, 1, 1) g (2) 1 (x 2, y 2 )g (2) (6, 0, 8, 0, 8, 6, 0, 8, 0) (2, 2, 1) g (2) 2 (x 2, y 2 )g (2) (14, 0, 8, 0, 8, 14, 0, 8, 0) (2, 2, 1) g (2) 3 (x 1, y 1 )g (2) 2 (x 2, y 2 )g (2) (8, 0, 8, 8, 0, 8, 0, 8, 8) (2, 2, 2) g (2) 2 (x 2, y 2 )g (2) (1, 0, 8, 10, 4, 1, 0, 8, 10) (2, 3, 2) g (2) (2, 0, 8, 8, 8, 2, 0, 8, 8) (2, 3, 2) g (2) (3, 0, 8, 10, 12, 3, 0, 8, 10) (2, 3, 2) g (2) (5, 0, 8, 2, 4, 5, 0, 8, 2) (2, 3, 2) g (2) (7, 0, 8, 2, 12, 7, 0, 8, 2) (2, 3, 2) g (2) (9, 0, 8, 10, 4, 9, 0, 8, 10) (2, 3, 2) g (2) (10, 0, 8, 8, 8, 10, 0, 8, 8) (2, 3, 2) g (2) (11, 0, 8, 10, 12, 11, 0, 8, 10) (2, 3, 2) g (2) (13, 0, 8, 2, 4, 13, 0, 8, 2) (2, 3, 2) g (2) (15, 0, 8, 2, 12, 15, 0, 8, 2) (2, 3, 2) g (2) g (2) 0 (x, y) = x xy y 2, g (2) 1 (x, y) = x xy 225y 2, g (2) 2 (x, y) = x2 16xy + 15y 2, g (2) 3 (x, y) = x2 y 2 14
15 Now we define he m-spoy Lee weigh, he m-spoy Lee disance and he m-spoy Lee weigh enumeraor for a bye error-conrol code over R k. Definiion 6.2. For any u = (u 1, u 2,, u n ) Rk bn, he m-spoy Lee weigh of u is defined as w ML (u) = n, where u i = (u i1, u i2,, u ib ) Rk b is he i-h bye of u and w L (u i ) = b j=1 w L (u ij ). wl (u i) Definiion 6.3. Le u, v be vecors in Rk bn wih heir i-h byes as u i, v i respecively. Then he m-spoy Lee disance beween u and v, denoed by d ML, is defined as d ML = n dl (u i, v i ) wl (u i v i ) = = w ML (u v). Noe ha d ML is a meric on Rk bn. Furher, if C is a bye error-conrol code of lengh bn and bye lengh b over R k, hen he number d ML (C) = min{d ML (u, v) : u, v C, u v} is called he m-spoy Lee disance of he code C. Moreover, d ML (C) = min{w ML (u) : u C, u 0}. Definiion 6.4. Le C be a bye error-conrol code of lengh bn and bye lengh b over R k. Then he m-spoy Lee weigh enumeraor of C is defined as L C (z) = u C z w ML(u) = u=(u 1,u 2,,u n) C j=1 n z w L(u i)/. Le u be any vecor in Rk bn wih u i Rk b as is i-h bye for 1 i n. For each i, if j ip(0 p l 1) is he number of bis in u i which are equal o r p, hen he l-uple J i = (j i0, j i1,, j i,l 1 ) is called composiion of he i-h bye u i of u, and he vecor J = (J 1, J 2,, J n ) is called he composiion vecor of u = (u 1, u 2,, u n ). Now le A(J ) be he number of codewords in C having he composiion vecor as J. Then he m-spoy Lee weigh enumeraor of C can be rewrien as where for each i, J i L C (z) = J A(J ) n z ρ(j i)/, j=1 = (j i0, j i1,, j i,l 1 ) and ρ(j i ) = l 1 p=0 w L (r p )j ip wih 0 j ip b for 0 p l 1. Le u be he fixed vecor. Define he numbers s pq, 0 p, q l 1, as he number of componens of he vecors u = (u 1, u 2,, u b ) and v = (v 1, v 2,, v b ) saisfying u i = r p and v i = r q. Definiion 6.5. For a fixed posiive ineger and J = (j 0, j 1,, j l 1 ), we define he polynomial g () J (z) = ( l 1 l 1 ) ( l 1 j p! l 1 χ r l 1 p r q s pq z w L (r q)s pq )/ p=0 q=1, s pq p=0 s pq! q=0 q=0 where he summaion s pq runs over all non-negaive inegers s pq (0 p, q l 1) saisfying l 1 q=0 s pq = j p for every p. Lemma 6.6. For a fixed vecor u Rk b wih composiion J = (j 0, j 1,, j l 1 ), we have χ( u, v )z wl(v) = g () J (z). v R b k 15
16 Proof. The proof is similar o ha of Lemma 2 in [9]. In he following heorem, we derive a MacWilliams ype ideniy for he m-spoy Lee weigh enumeraor of a bye error-conrol code over an infinie family of rings. Theorem 6.7. Le C be a bye error-conrol code of lengh bn over R k wih bye lengh b and m-spoy Lee weigh enumeraor L C (z) as defined above. If A(J 1, J 2,, J n ) denoes he number of codewords in C having he composiion vecor as J = (J 1, J 2,, J n ), hen he m-spoy Lee weigh enumeraor L C of he dual code C is given by L C (z) = 1 n A(J ) J g () J i (z), where he summaion runs over all n-uples J wih each J i, an l-uple over {0, 1, 2,, b}. Proof. The proof is similar o hose of Theorem 3.12 and Theorem 28 in [9]. Example 6.8 Le C be he bye error-conrol code as defined in Example Since C = is very large, we will apply Theorem 6.7 o obain he m-spoy Lee weigh enumeraor of C. For his, we compue he composiion vecors for he codewords of C. I is easy o check ha (0, 0, uv, uv, 0, 0, 0, uv, uv) C and is composiion vecor is J 1, J 2 and J 3 where (J 1, J 2, J 3 ) = (( [2] 0 [1] 8 ), ( [2] 0 [1] 8 ), ( [1] 0 [2] 8 )). Here, [s] p represens here are s elemens equal o r p, where 0 p 15, 0 s 3 and r p R 2 is defined in Table V, which gives an alernaive expression form for every elemen r p = auv + bv + cu + d R 2, where (a, b, c, d) Z 4 2. For = 2, by Definiion 6.5, we ge g (2) J 1 (z) = g (2) J 2 (z) = 1 + 6z 29z z 3 9z 4 10z 5 + 5z 6 and g (2) J 3 (z) = 1 2z 5z z 3 25z z 5 3z 6. We noe ha he codeword (0, 0, uv, uv, 0, 0, 0, uv, uv) C conribues he erm g (2) J 1 (z)g (2) J 2 (z)g (2) J 3 (z) = z 51z 2 272z z z z z z z z z z z z z z z 17 75z 18 o he m-spoy Lee weigh enumeraor of C. Working similarly, we obain he composiion vecors and he conribuing polynomials for oher codewords in C, which are given in Table VI. Therefore by Theorem 6.7, he m-spoy Lee weigh enumeraor of he code C is given by L C = 1 n A(J ) J g () J i (z) = 101z z z z z z z z z z z z z z z z z z Conclusion This paper mainly presens he MacWilliams ype ideniies for he m-spoy Hamming weigh enumeraor, join m-spoy Hamming weigh enumeraor and spli m-spoy Hamming weigh enumeraor for bye error-conrol codes over finie commuaive Frobenius rings. Finally, he m-spoy Lee weigh enumeraor over an infinie family of rings R k is also obained. In fac, Join m-spoy Lee weigh enumeraor (Theorem 8 and Theorem 9 in [9]) and Spli m-spoy Lee weigh enumeraor (Theorem 5 in [9]) are also valid over he infinie family of rings R k. Moreover, he resuls in [10] for r-fold join m-spoy Hamming weigh enumeraors sill hold over finie commuaive Frobenius rings by applying he similar mehod in Theorem
17 Table V Alernaive expression of elemens of R k (a, b, c, d) r p (0, 0, 0, 0) r 0 = 0 (0, 0, 0, 1) r 1 = 1 (0, 0, 1, 0) r 2 = u (0, 0, 1, 1) r 3 = 1 + u (0, 1, 0, 0) r 4 = v (0, 1, 0, 1) r 5 = 1 + v (0, 1, 1, 0) r 6 = u + v (0, 1, 1, 1) r 7 = 1 + u + v (1, 0, 0, 0) r 8 = uv (1, 0, 0, 1) r 9 = 1 + uv (1, 0, 1, 0) r 10 = u + uv (1, 0, 1, 1) r 11 = 1 + u + uv (1, 1, 0, 0) r 12 = v + uv (1, 1, 0, 1) r 13 = 1 + v + uv (1, 1, 1, 0) r 14 = u + v + uv (1, 1, 1, 1) r 15 = 1 + u + v + uv Table VI Codewords, composiion vecors and conribuing polynomials codewords (J 1, J 2, J 3) g (2) J 1 g (2) J 2 g (2) J 3 (0, 0, 0, 0, 0, 0, 0, 0, 0) (([3] 0 ), ([3] 0 ), ([3] 0 )) a 3 (8, 0, 0, 0, 0, 8, 0, 0, 0) (([2] 0 [1] 8 ), ([2] 0 [1] 8 ), ([3] 0 )) ab 2 (0, 0, 8, 8, 0, 0, 0, 8, 8) (([2] 0 [1] 8 ), ([2] 0 [1] 8 ), ([1] 0 [2] 8 )) b 2 c (2, 0, 0, 0, 8, 2, 0, 0, 0) (([2] 0 [1] 2 ), ( [3] 5 ), ([1] 0[2] 5 )) ade (10, 0, 0, 0, 8, 10, 0, 0, 0) (([2] 0 [1] 10 ), ([1] 0 [1] 8 [1] 10 ), ( [3] 2 ), ([3] 0 )) ade (4, 0, 0, 8, 0, 4, 0, 0, 8) (([2] 0 [1] 4 ), ([1] 0 [1] 4 [1] 8 ), ([2] 0 [1] 8 )) bde (12, 0, 0, 8, 0, 12, 0, 0, 8) (([2] 0 [1] 12 ), ([1] 0 [1] 8 [1] 10 ), ([2] 0 [1] 8 )) ade (1, 0, 0, 2, 4, 1, 0, 0, 2) (([2] 0[1] 1 ), ( [1] 1[1] 2 [1] 4 ), ([2] 0 [1] 2 )) cdf (3, 0, 0, 2, 12, 3, 0, 0, 2) (([2] 0 [1] 3 ), ( [1] 2[1] 3 [1] 12 ), ([2] 0 [1] 2 )) cdf (5, 0, 0, 10, 4, 5, 0, 0, 10) (([2] 0 [1] 5 ), ( [1] 4[1] 5 [1] 10 ), ([2] 0 [1] 10 )) cdf (6, 0, 0, 8, 8, 6, 0, 0, 8) (([2] 0 [1] 8 ), ([1] 6 [2] 8 ), ([2] 0 [1] 8 )) bdg (7, 0, 0, 10, 12, 7, 0, 0, 10) (([2] 0 [1] 7 ), ( [1] 7 [1] 10 [1] 12 ), ([2] 0 [1] 10 )) deg (9, 0, 0, 2, 4, 9, 0, 0, 2) (([2] 0 [1] 9 ), ( [1] 2 [1] 4 [1] 9 ), ([2] 0 [1] 2 )) deg (11, 0, 0, 2, 12, 11, 0, 0, 2) (([2] 0 [1] 11 ), ( [1] 2 [1] 11 [1] 12 ), ([2] 0 [1] 2 )) deg (13, 0, 0, 10, 4, 13, 0, 0, 10) (([2] 0 [1] 13 ), ( [1] 4 [1] 10 [1] 13 ), ([2] 0 [1] 10 )) deg (14, 0, 0, 8, 8, 14, 0, 0, 8) (([2] 0 [1] 14 ), ( [2] 8 [1] 14 ), ([2] 0 [1] 8 )) bdg (15, 0, 0, 10, 12, 15, 0, 0, 10) (([2] 0 [1] 15 ), ( [1] 10 [1] 12 [1] 15 ), ([2] 0 [1] 10 )) dcf (4, 0, 8, 0, 0, 4, 0, 8, 0) (([1] 0 [1] 4 [1] 8 ), ([2] 0 [1] 4 ), ([2] 0 [1] 8)) bde (12, 0, 8, 0, 0, 12, 0, 8, 0) (([1] 0 [1] 8 [1] 12 ), ([2] 0 [1] 12 ), ([2] 0 [1] 8)) bde (6, 0, 8, 0, 8, 6, 0, 8, 0) (([1] 0 [1] 6 [1] 8 ), ([1] 0 [1] 6 [1] 8 ), ([2] 0 [1] 8)) be 2 (14, 0, 8, 0, 8, 14, 0, 8, 0) (([1] 0 [1] 8 [1] 14 ), ([1] 0 [1] 8 [1] 14 ), ([2] 0 [1] 8)) be 2 (8, 0, 8, 8, 0, 8, 0, 8, 8) (([1] 0 [2] 8 ), ([1] 0 [2] 8 ), ([1] 0 [2] 8 )) c 3 (1, 0, 8, 10, 4, 1, 0, 8, 10) (([1] 0[1] 1 [1] 8 ), ( [1] 1 [1] 4 [1] 10 ), ([1] 0 [1] 8 [1] 10 )) c 2 e (2, 0, 8, 8, 8, 2, 0, 8, 8) (([1] 0 [1] 2 [1] 8 ), ( [1] 2 [2] 8 ), ([1] 0 [2] 8 )) ceg (3, 0, 8, 10, 12, 3, 0, 8, 10) (([1] 0 [1] 3 [1] 8 ), ( [1] 3 [1] 10 [1] 12 ), ([1] 0 [1] 8 [1] 10 )) c 2 e (5, 0, 8, 2, 4, 5, 0, 8, 2) (([1] 0 [1] 5 [1] 8 ), ( [1] 2 [1] 4 [1] 5 ), ([1] 0 [1] 2 [1] 8 )) c 2 e (7, 0, 8, 2, 12, 7, 0, 8, 2) (([1] 0 [1] 7 [1] 8 ), ( [1] 2 [1] 7 [1] 12 ), ([1] 0 [1] 2 [1] 8 )) e 3 (9, 0, 8, 10, 4, 9, 0, 8, 10) (([1] 0 [1] 8[1] 9 ), ( [1] 4 [1] 9 [1] 10 ), ([1] 0 [1] 8 [1] 10 )) e 3 (10, 0, 8, 8, 8, 10, 0, 8, 8) (([1] 0 [1] 8 [1] 10 ), ( [2] 8 [1] 10 ), ([1] 0 [2] 8 )) ceg (11, 0, 8, 10, 12, 11, 0, 8, 10) (([1] 0 [1] 8 [1] 11 ), ( [1] 10[1] 11[1] 12 )), ([1] 0 [1] 8 [1] 10 )) e 3 (13, 0, 8, 2, 4, 13, 0, 8, 2) (([1] 0 [1] 8 [1] 13 ), ( [1] 2 [1] 4 [1] 13 )), ([1] 0 [1] 2 [1] 8 )) e 3 (15, 0, 8, 2, 12, 15, 0, 8, 2) (([1] 0 [1] 8 [1] 15 ), ( [1] 2 [1] 12 [1] 15 )), ([1] 0 [1] 2 [1] 8 )) c 2 e a = z + 715z z z z z 6, b = 1 + 6z 29z z 3 9z 4 10z 5 + 5z 6, c = 1 2z 5z z 3 25z z 5 3z 6, d = z + 55z 2 132z 3 33z z 5 + 9z 6, e = 1 6z + 15z 2 20z z 4 6z 5 + z 6, f = z + 275z z 3 297z 4 154z 5 11z 6. 17
18 8 Acknowledgmens This research was done while he auhor was visiing CCRG of Nanyang Technological Universiy. The auhor is graeful o Professor San Ling for helpful discussions which improved he presenaion of he maerial. References [1] S. T. Doughery, B. Yildiz, and S. Karadeniz, Codes over R k, Gray maps and heir binary images. Designs, Codes and Crypography April 2012, 63(1): [2] S. T. Doughery, M. Harada, M. Oura, Noe on he g-fold join weigh enumeraors of self-dual codes over Z k, Appl. Algebra Eng. Commun. Compu., 2001, 11(6): [3] Y. Fan, S. Ling, and H. W. Liu, Marix produc codes over finie commuaive Frobenius rings, Designs, Codes and Crypography, Doi /s y. [4] E. Fujiwara, Code design for dependable sysem, Theory and pracocal applicaion, Wiley & Son, Inc., [5] F. J. MacWilliams, N. J. Sloane, The Theory of error-correcing codes, Norh-Holland Publishing Company, Amserdam, [6] M. Özen, V. Siap, The MacWilliams ideniy for m-spoy weigh enumeraors of linear codes over finie fields, Compuers and Mahemaics wih Applicaions, 2011, 61(4): [7] M. Özen, V. Siap, The MacWilliams ideniy for m-spoy Rosenbloom-Tsfasman weigh enumeraor, Journal of he Franklin Insiue, (2012), hp://dx. doi.org/ /j. jfranklin [8] A. Sharma and A. K. Sharma, MacWilliams ype ideniies for some new m-spoy weigh enumeraors, IEEE Transacions on Informaion Theory, 2012, 58(6): [9] A. Sharma and A. K. Sharma, On some new m-spoy Lee weigh enumeraors, Designs, Codes and Crypography, Doi /s z. [10] A. Sharma and A. K. Sharma, On MacWilliams ype ideniies for r-fold join m-spoy weigh enumeraors, Discree Mahemaics, 2012, 312(22): [11] M. J. Shi, MacWilliams ideniy for m-spoy RT weigh enumeraors over finie commuaive Frobenius rings, submied o Science China Mahemaics for publicaion. [12] M. J. Shi, MacWilliams ideniy for m-spoy weigh enumeraors over F 2 +uf 2 + +u m 1 F 2, submied o Turkish Journal of Mahemaics for publicaion. [13] I. Siap, An ideniy beween he m-spoy weigh enumeraors of a linear code and is dual, Turkish Journal of Mahemaics, doi: /ma [14] I. Siap, MacWilliams ideniy for m-spoy Lee weigh enumeraors, Applied Mahemaics Leers, 2010, 23(1): [15] K. Suzuki, T. Kashiyama, E. Fujiwara, MacWilliams ideniy for m-spoy weigh enumeraor. in: ISIT Nice, France, 2007, pp: [16] K. Suzuki, T. Kashiyama, E. Fujiwara, A general class of m-spoy weigh enumeraor, IEICE- Transacionson Fundamenals of Elecronics, Communicaions and Compuer Sciences E90- A(7)(2007): [17] J. Wood, Dualiy for modules over finie rings and applicaion o coding heory. Am. J. Mah. 1999, [18] J. Wood, Applicaion of finie Frobenius rings o he foundaions of algebraic coding heory. Proceedings of he 44h Symposium on Ring Theory and Represenaion Theory (Okayama Universiy, Japan, Sepember 25-27, 2011), O. Iyama, ed., Nagoya, Japan, 2012, pp
MacWilliams Type identities for m-spotty Rosenbloom-Tsfasman weight enumerators over finite commutative Frobenius rings
MacWilliams Type identities for m-spotty Rosenbloom-Tsfasman weight enumerators over finite commutative Frobenius rings Minjia Shi School of Mathematical Sciences of Anhui University, 230601 Hefei, Anhui,
More informationTHE GENERALIZED PASCAL MATRIX VIA THE GENERALIZED FIBONACCI MATRIX AND THE GENERALIZED PELL MATRIX
J Korean Mah Soc 45 008, No, pp 479 49 THE GENERALIZED PASCAL MATRIX VIA THE GENERALIZED FIBONACCI MATRIX AND THE GENERALIZED PELL MATRIX Gwang-yeon Lee and Seong-Hoon Cho Reprined from he Journal of he
More information23.2. Representing Periodic Functions by Fourier Series. Introduction. Prerequisites. Learning Outcomes
Represening Periodic Funcions by Fourier Series 3. Inroducion In his Secion we show how a periodic funcion can be expressed as a series of sines and cosines. We begin by obaining some sandard inegrals
More informationGCD AND LCM-LIKE IDENTITIES FOR IDEALS IN COMMUTATIVE RINGS
GCD AND LCM-LIKE IDENTITIES FOR IDEALS IN COMMUTATIVE RINGS D. D. ANDERSON, SHUZO IZUMI, YASUO OHNO, AND MANABU OZAKI Absrac. Le A 1,..., A n n 2 be ideals of a commuaive ring R. Le Gk resp., Lk denoe
More informationWe just finished the Erdős-Stone Theorem, and ex(n, F ) (1 1/(χ(F ) 1)) ( n
Lecure 3 - Kövari-Sós-Turán Theorem Jacques Versraëe jacques@ucsd.edu We jus finished he Erdős-Sone Theorem, and ex(n, F ) ( /(χ(f ) )) ( n 2). So we have asympoics when χ(f ) 3 bu no when χ(f ) = 2 i.e.
More informationMonochromatic Infinite Sumsets
Monochromaic Infinie Sumses Imre Leader Paul A. Russell July 25, 2017 Absrac WeshowhahereisaraionalvecorspaceV suchha,whenever V is finiely coloured, here is an infinie se X whose sumse X+X is monochromaic.
More informationU( θ, θ), U(θ 1/2, θ + 1/2) and Cauchy (θ) are not exponential families. (The proofs are not easy and require measure theory. See the references.
Lecure 5 Exponenial Families Exponenial families, also called Koopman-Darmois families, include a quie number of well known disribuions. Many nice properies enjoyed by exponenial families allow us o provide
More informationINDEPENDENT SETS IN GRAPHS WITH GIVEN MINIMUM DEGREE
INDEPENDENT SETS IN GRAPHS WITH GIVEN MINIMUM DEGREE JAMES ALEXANDER, JONATHAN CUTLER, AND TIM MINK Absrac The enumeraion of independen ses in graphs wih various resricions has been a opic of much ineres
More informationMatrix Versions of Some Refinements of the Arithmetic-Geometric Mean Inequality
Marix Versions of Some Refinemens of he Arihmeic-Geomeric Mean Inequaliy Bao Qi Feng and Andrew Tonge Absrac. We esablish marix versions of refinemens due o Alzer ], Carwrigh and Field 4], and Mercer 5]
More informationRobust estimation based on the first- and third-moment restrictions of the power transformation model
h Inernaional Congress on Modelling and Simulaion, Adelaide, Ausralia, 6 December 3 www.mssanz.org.au/modsim3 Robus esimaion based on he firs- and hird-momen resricions of he power ransformaion Nawaa,
More information10. State Space Methods
. Sae Space Mehods. Inroducion Sae space modelling was briefly inroduced in chaper. Here more coverage is provided of sae space mehods before some of heir uses in conrol sysem design are covered in he
More informationTranscendence of solutions of q-airy equation.
Josai Mahemaical Monographs vol. 0 (207), pp. 29 37 Transcendence of soluions of q-airy equaion. Seiji NISHIOKA Absrac. In his paper, we prove ranscendence of soluions of he ieraed Riccai equaions associaed
More informationStability and Bifurcation in a Neural Network Model with Two Delays
Inernaional Mahemaical Forum, Vol. 6, 11, no. 35, 175-1731 Sabiliy and Bifurcaion in a Neural Nework Model wih Two Delays GuangPing Hu and XiaoLing Li School of Mahemaics and Physics, Nanjing Universiy
More informationMath-Net.Ru All Russian mathematical portal
Mah-NeRu All Russian mahemaical poral Roman Popovych, On elemens of high order in general finie fields, Algebra Discree Mah, 204, Volume 8, Issue 2, 295 300 Use of he all-russian mahemaical poral Mah-NeRu
More information14 Autoregressive Moving Average Models
14 Auoregressive Moving Average Models In his chaper an imporan parameric family of saionary ime series is inroduced, he family of he auoregressive moving average, or ARMA, processes. For a large class
More informationMODULE 3 FUNCTION OF A RANDOM VARIABLE AND ITS DISTRIBUTION LECTURES PROBABILITY DISTRIBUTION OF A FUNCTION OF A RANDOM VARIABLE
Topics MODULE 3 FUNCTION OF A RANDOM VARIABLE AND ITS DISTRIBUTION LECTURES 2-6 3. FUNCTION OF A RANDOM VARIABLE 3.2 PROBABILITY DISTRIBUTION OF A FUNCTION OF A RANDOM VARIABLE 3.3 EXPECTATION AND MOMENTS
More informationt is a basis for the solution space to this system, then the matrix having these solutions as columns, t x 1 t, x 2 t,... x n t x 2 t...
Mah 228- Fri Mar 24 5.6 Marix exponenials and linear sysems: The analogy beween firs order sysems of linear differenial equaions (Chaper 5) and scalar linear differenial equaions (Chaper ) is much sronger
More information11!Hí MATHEMATICS : ERDŐS AND ULAM PROC. N. A. S. of decomposiion, properly speaking) conradics he possibiliy of defining a counably addiive real-valu
ON EQUATIONS WITH SETS AS UNKNOWNS BY PAUL ERDŐS AND S. ULAM DEPARTMENT OF MATHEMATICS, UNIVERSITY OF COLORADO, BOULDER Communicaed May 27, 1968 We shall presen here a number of resuls in se heory concerning
More informationChapter 2. First Order Scalar Equations
Chaper. Firs Order Scalar Equaions We sar our sudy of differenial equaions in he same way he pioneers in his field did. We show paricular echniques o solve paricular ypes of firs order differenial equaions.
More informationSome Ramsey results for the n-cube
Some Ramsey resuls for he n-cube Ron Graham Universiy of California, San Diego Jozsef Solymosi Universiy of Briish Columbia, Vancouver, Canada Absrac In his noe we esablish a Ramsey-ype resul for cerain
More informationVehicle Arrival Models : Headway
Chaper 12 Vehicle Arrival Models : Headway 12.1 Inroducion Modelling arrival of vehicle a secion of road is an imporan sep in raffic flow modelling. I has imporan applicaion in raffic flow simulaion where
More informationarxiv: v1 [math.pr] 19 Feb 2011
A NOTE ON FELLER SEMIGROUPS AND RESOLVENTS VADIM KOSTRYKIN, JÜRGEN POTTHOFF, AND ROBERT SCHRADER ABSTRACT. Various equivalen condiions for a semigroup or a resolven generaed by a Markov process o be of
More informationREMARK ON THE PAPER ON PRODUCTS OF FOURIER COEFFICIENTS OF CUSP FORMS 1. INTRODUCTION
REMARK ON THE PAPER ON PRODUCTS OF FOURIER COEFFICIENTS OF CUSP FORMS YUK-KAM LAU, YINGNAN WANG, DEYU ZHANG ABSTRACT. Le a(n) be he Fourier coefficien of a holomorphic cusp form on some discree subgroup
More informationKEY. Math 334 Midterm III Winter 2008 section 002 Instructor: Scott Glasgow
KEY Mah 334 Miderm III Winer 008 secion 00 Insrucor: Sco Glasgow Please do NOT wrie on his exam. No credi will be given for such work. Raher wrie in a blue book, or on your own paper, preferably engineering
More informationLecture Notes 2. The Hilbert Space Approach to Time Series
Time Series Seven N. Durlauf Universiy of Wisconsin. Basic ideas Lecure Noes. The Hilber Space Approach o Time Series The Hilber space framework provides a very powerful language for discussing he relaionship
More informationarxiv: v1 [math.ca] 15 Nov 2016
arxiv:6.599v [mah.ca] 5 Nov 26 Counerexamples on Jumarie s hree basic fracional calculus formulae for non-differeniable coninuous funcions Cheng-shi Liu Deparmen of Mahemaics Norheas Peroleum Universiy
More informationFréchet derivatives and Gâteaux derivatives
Fréche derivaives and Gâeaux derivaives Jordan Bell jordan.bell@gmail.com Deparmen of Mahemaics, Universiy of Torono April 3, 2014 1 Inroducion In his noe all vecor spaces are real. If X and Y are normed
More informationOrthogonal Rational Functions, Associated Rational Functions And Functions Of The Second Kind
Proceedings of he World Congress on Engineering 2008 Vol II Orhogonal Raional Funcions, Associaed Raional Funcions And Funcions Of The Second Kind Karl Deckers and Adhemar Bulheel Absrac Consider he sequence
More informationnon -negative cone Population dynamics motivates the study of linear models whose coefficient matrices are non-negative or positive.
LECTURE 3 Linear/Nonnegaive Marix Models x ( = Px ( A= m m marix, x= m vecor Linear sysems of difference equaions arise in several difference conexs: Linear approximaions (linearizaion Perurbaion analysis
More informationA problem related to Bárány Grünbaum conjecture
Filoma 27:1 (2013), 109 113 DOI 10.2298/FIL1301109B Published by Faculy of Sciences and Mahemaics, Universiy of Niš, Serbia Available a: hp://www.pmf.ni.ac.rs/filoma A problem relaed o Bárány Grünbaum
More informationTHE MATRIX-TREE THEOREM
THE MATRIX-TREE THEOREM 1 The Marix-Tree Theorem. The Marix-Tree Theorem is a formula for he number of spanning rees of a graph in erms of he deerminan of a cerain marix. We begin wih he necessary graph-heoreical
More informationExponential Weighted Moving Average (EWMA) Chart Under The Assumption of Moderateness And Its 3 Control Limits
DOI: 0.545/mjis.07.5009 Exponenial Weighed Moving Average (EWMA) Char Under The Assumpion of Moderaeness And Is 3 Conrol Limis KALPESH S TAILOR Assisan Professor, Deparmen of Saisics, M. K. Bhavnagar Universiy,
More informationCash Flow Valuation Mode Lin Discrete Time
IOSR Journal of Mahemaics (IOSR-JM) e-issn: 2278-5728,p-ISSN: 2319-765X, 6, Issue 6 (May. - Jun. 2013), PP 35-41 Cash Flow Valuaion Mode Lin Discree Time Olayiwola. M. A. and Oni, N. O. Deparmen of Mahemaics
More informationNEW EXAMPLES OF CONVOLUTIONS AND NON-COMMUTATIVE CENTRAL LIMIT THEOREMS
QUANTUM PROBABILITY BANACH CENTER PUBLICATIONS, VOLUME 43 INSTITUTE OF MATHEMATICS POLISH ACADEMY OF SCIENCES WARSZAWA 998 NEW EXAMPLES OF CONVOLUTIONS AND NON-COMMUTATIVE CENTRAL LIMIT THEOREMS MAREK
More informationAn Introduction to Malliavin calculus and its applications
An Inroducion o Malliavin calculus and is applicaions Lecure 5: Smoohness of he densiy and Hörmander s heorem David Nualar Deparmen of Mahemaics Kansas Universiy Universiy of Wyoming Summer School 214
More informationBernoulli numbers. Francesco Chiatti, Matteo Pintonello. December 5, 2016
UNIVERSITÁ DEGLI STUDI DI PADOVA, DIPARTIMENTO DI MATEMATICA TULLIO LEVI-CIVITA Bernoulli numbers Francesco Chiai, Maeo Pinonello December 5, 206 During las lessons we have proved he Las Ferma Theorem
More informationSUBSPACES OF MATRICES WITH SPECIAL RANK PROPERTIES
SUBSPACES OF MATRICES WITH SPECIAL RANK PROPERTIES JEAN-GUILLAUME DUMAS, ROD GOW, GARY MCGUIRE, AND JOHN SHEEKEY Absrac. Le K be a field and le V be a vecor space of finie dimension n over K. We invesigae
More informationCHAPTER 2 Signals And Spectra
CHAPER Signals And Specra Properies of Signals and Noise In communicaion sysems he received waveform is usually caegorized ino he desired par conaining he informaion, and he undesired par. he desired par
More informationGENERALIZATION OF THE FORMULA OF FAA DI BRUNO FOR A COMPOSITE FUNCTION WITH A VECTOR ARGUMENT
Inerna J Mah & Mah Sci Vol 4, No 7 000) 48 49 S0670000970 Hindawi Publishing Corp GENERALIZATION OF THE FORMULA OF FAA DI BRUNO FOR A COMPOSITE FUNCTION WITH A VECTOR ARGUMENT RUMEN L MISHKOV Received
More informationPhysics 235 Chapter 2. Chapter 2 Newtonian Mechanics Single Particle
Chaper 2 Newonian Mechanics Single Paricle In his Chaper we will review wha Newon s laws of mechanics ell us abou he moion of a single paricle. Newon s laws are only valid in suiable reference frames,
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN
Inernaional Journal of Scienific & Engineering Research, Volume 4, Issue 10, Ocober-2013 900 FUZZY MEAN RESIDUAL LIFE ORDERING OF FUZZY RANDOM VARIABLES J. EARNEST LAZARUS PIRIYAKUMAR 1, A. YAMUNA 2 1.
More informationThe Stacked Semi-Groups and Fuzzy Stacked Systems on Transportation Models
Inernaional Journal of Scienific and Research Publicaions, Volume 4, Issue 8, Augus 2014 1 The Sacked Semi-Groups and Fuzzy Sacked Sysems on Transporaion Models Aymen. A. Ahmed Imam *, Mohammed Ali Bshir
More informationODEs II, Lecture 1: Homogeneous Linear Systems - I. Mike Raugh 1. March 8, 2004
ODEs II, Lecure : Homogeneous Linear Sysems - I Mike Raugh March 8, 4 Inroducion. In he firs lecure we discussed a sysem of linear ODEs for modeling he excreion of lead from he human body, saw how o ransform
More informationERROR LOCATING CODES AND EXTENDED HAMMING CODE. Pankaj Kumar Das. 1. Introduction and preliminaries
MATEMATIČKI VESNIK MATEMATIQKI VESNIK 70, 1 (2018), 89 94 March 2018 research paper originalni nauqni rad ERROR LOCATING CODES AND EXTENDED HAMMING CODE Pankaj Kumar Das Absrac. Error-locaing codes, firs
More informationCHARACTERIZATION OF REARRANGEMENT INVARIANT SPACES WITH FIXED POINTS FOR THE HARDY LITTLEWOOD MAXIMAL OPERATOR
Annales Academiæ Scieniarum Fennicæ Mahemaica Volumen 31, 2006, 39 46 CHARACTERIZATION OF REARRANGEMENT INVARIANT SPACES WITH FIXED POINTS FOR THE HARDY LITTLEWOOD MAXIMAL OPERATOR Joaquim Marín and Javier
More informationApplication of a Stochastic-Fuzzy Approach to Modeling Optimal Discrete Time Dynamical Systems by Using Large Scale Data Processing
Applicaion of a Sochasic-Fuzzy Approach o Modeling Opimal Discree Time Dynamical Sysems by Using Large Scale Daa Processing AA WALASZE-BABISZEWSA Deparmen of Compuer Engineering Opole Universiy of Technology
More informationt 2 B F x,t n dsdt t u x,t dxdt
Evoluion Equaions For 0, fixed, le U U0, where U denoes a bounded open se in R n.suppose ha U is filled wih a maerial in which a conaminan is being ranspored by various means including diffusion and convecion.
More informationThe Asymptotic Behavior of Nonoscillatory Solutions of Some Nonlinear Dynamic Equations on Time Scales
Advances in Dynamical Sysems and Applicaions. ISSN 0973-5321 Volume 1 Number 1 (2006, pp. 103 112 c Research India Publicaions hp://www.ripublicaion.com/adsa.hm The Asympoic Behavior of Nonoscillaory Soluions
More informationLecture 20: Riccati Equations and Least Squares Feedback Control
34-5 LINEAR SYSTEMS Lecure : Riccai Equaions and Leas Squares Feedback Conrol 5.6.4 Sae Feedback via Riccai Equaions A recursive approach in generaing he marix-valued funcion W ( ) equaion for i for he
More informationWeyl sequences: Asymptotic distributions of the partition lengths
ACTA ARITHMETICA LXXXVIII.4 (999 Weyl sequences: Asympoic disribuions of he pariion lenghs by Anaoly Zhigljavsky (Cardiff and Iskander Aliev (Warszawa. Inroducion: Saemen of he problem and formulaion of
More information( ) ( ) if t = t. It must satisfy the identity. So, bulkiness of the unit impulse (hyper)function is equal to 1. The defining characteristic is
UNIT IMPULSE RESPONSE, UNIT STEP RESPONSE, STABILITY. Uni impulse funcion (Dirac dela funcion, dela funcion) rigorously defined is no sricly a funcion, bu disribuion (or measure), precise reamen requires
More informationNotes for Lecture 17-18
U.C. Berkeley CS278: Compuaional Complexiy Handou N7-8 Professor Luca Trevisan April 3-8, 2008 Noes for Lecure 7-8 In hese wo lecures we prove he firs half of he PCP Theorem, he Amplificaion Lemma, up
More informationarxiv: v1 [math.fa] 9 Dec 2018
AN INVERSE FUNCTION THEOREM CONVERSE arxiv:1812.03561v1 [mah.fa] 9 Dec 2018 JIMMIE LAWSON Absrac. We esablish he following converse of he well-known inverse funcion heorem. Le g : U V and f : V U be inverse
More informationZeta Functions of Representations
COMMENTARII MATHEMATICI UNIVERSITATIS SANCTI PAULI Vol. 63, No. &2 204 ed. RIKKYO UNIV/MATH IKEBUKURO TOKYO 7 850 JAPAN Zea Funcions of Represenaions by Nobushige KUROKAWA and Hiroyuki OCHIAI (Received
More informationThe Miki-type identity for the Apostol-Bernoulli numbers
Annales Mahemaicae e Informaicae 46 6 pp. 97 4 hp://ami.ef.hu The Mii-ype ideniy for he Aposol-Bernoulli numbers Orli Herscovici, Toufi Mansour Deparmen of Mahemaics, Universiy of Haifa, 3498838 Haifa,
More informationBBP-type formulas, in general bases, for arctangents of real numbers
Noes on Number Theory and Discree Mahemaics Vol. 19, 13, No. 3, 33 54 BBP-ype formulas, in general bases, for arcangens of real numbers Kunle Adegoke 1 and Olawanle Layeni 2 1 Deparmen of Physics, Obafemi
More informationStationary Distribution. Design and Analysis of Algorithms Andrei Bulatov
Saionary Disribuion Design and Analysis of Algorihms Andrei Bulaov Algorihms Markov Chains 34-2 Classificaion of Saes k By P we denoe he (i,j)-enry of i, j Sae is accessible from sae if 0 for some k 0
More informationKEY. Math 334 Midterm III Fall 2008 sections 001 and 003 Instructor: Scott Glasgow
KEY Mah 334 Miderm III Fall 28 secions and 3 Insrucor: Sco Glasgow Please do NOT wrie on his exam. No credi will be given for such work. Raher wrie in a blue book, or on your own paper, preferably engineering
More informationMathematical Theory and Modeling ISSN (Paper) ISSN (Online) Vol 3, No.3, 2013
Mahemaical Theory and Modeling ISSN -580 (Paper) ISSN 5-05 (Online) Vol, No., 0 www.iise.org The ffec of Inverse Transformaion on he Uni Mean and Consan Variance Assumpions of a Muliplicaive rror Model
More informationExistence of positive solution for a third-order three-point BVP with sign-changing Green s function
Elecronic Journal of Qualiaive Theory of Differenial Equaions 13, No. 3, 1-11; hp://www.mah.u-szeged.hu/ejqde/ Exisence of posiive soluion for a hird-order hree-poin BVP wih sign-changing Green s funcion
More informationMath 334 Fall 2011 Homework 11 Solutions
Dec. 2, 2 Mah 334 Fall 2 Homework Soluions Basic Problem. Transform he following iniial value problem ino an iniial value problem for a sysem: u + p()u + q() u g(), u() u, u () v. () Soluion. Le v u. Then
More informationIntuitionistic Fuzzy 2-norm
In. Journal of Mah. Analysis, Vol. 5, 2011, no. 14, 651-659 Inuiionisic Fuzzy 2-norm B. Surender Reddy Deparmen of Mahemaics, PGCS, Saifabad, Osmania Universiy Hyderabad - 500004, A.P., India bsrmahou@yahoo.com
More information2. Nonlinear Conservation Law Equations
. Nonlinear Conservaion Law Equaions One of he clear lessons learned over recen years in sudying nonlinear parial differenial equaions is ha i is generally no wise o ry o aack a general class of nonlinear
More informationApproximation Algorithms for Unique Games via Orthogonal Separators
Approximaion Algorihms for Unique Games via Orhogonal Separaors Lecure noes by Konsanin Makarychev. Lecure noes are based on he papers [CMM06a, CMM06b, LM4]. Unique Games In hese lecure noes, we define
More informationOn Two Integrability Methods of Improper Integrals
Inernaional Journal of Mahemaics and Compuer Science, 13(218), no. 1, 45 5 M CS On Two Inegrabiliy Mehods of Improper Inegrals H. N. ÖZGEN Mahemaics Deparmen Faculy of Educaion Mersin Universiy, TR-33169
More informationA New Perturbative Approach in Nonlinear Singularity Analysis
Journal of Mahemaics and Saisics 7 (: 49-54, ISSN 549-644 Science Publicaions A New Perurbaive Approach in Nonlinear Singulariy Analysis Ta-Leung Yee Deparmen of Mahemaics and Informaion Technology, The
More informationLogic in computer science
Logic in compuer science Logic plays an imporan role in compuer science Logic is ofen called he calculus of compuer science Logic plays a similar role in compuer science o ha played by calculus in he physical
More informationLECTURE 1: GENERALIZED RAY KNIGHT THEOREM FOR FINITE MARKOV CHAINS
LECTURE : GENERALIZED RAY KNIGHT THEOREM FOR FINITE MARKOV CHAINS We will work wih a coninuous ime reversible Markov chain X on a finie conneced sae space, wih generaor Lf(x = y q x,yf(y. (Recall ha q
More informationProduct Operators. Fundamentals of MR Alec Ricciuti 3 March 2011
Produc Operaors Fundamenals of MR Alec Ricciui 3 March 2011 Ouline Review of he classical vecor model Operaors Mahemaical definiion Quanum mechanics Densiy operaors Produc operaors Spin sysems Single spin-1/2
More informationChapter 2. Models, Censoring, and Likelihood for Failure-Time Data
Chaper 2 Models, Censoring, and Likelihood for Failure-Time Daa William Q. Meeker and Luis A. Escobar Iowa Sae Universiy and Louisiana Sae Universiy Copyrigh 1998-2008 W. Q. Meeker and L. A. Escobar. Based
More informationHedgehogs are not colour blind
Hedgehogs are no colour blind David Conlon Jacob Fox Vojěch Rödl Absrac We exhibi a family of 3-uniform hypergraphs wih he propery ha heir 2-colour Ramsey numbers grow polynomially in he number of verices,
More informationFinish reading Chapter 2 of Spivak, rereading earlier sections as necessary. handout and fill in some missing details!
MAT 257, Handou 6: Ocober 7-2, 20. I. Assignmen. Finish reading Chaper 2 of Spiva, rereading earlier secions as necessary. handou and fill in some missing deails! II. Higher derivaives. Also, read his
More informationOrdinary Differential Equations
Ordinary Differenial Equaions 5. Examples of linear differenial equaions and heir applicaions We consider some examples of sysems of linear differenial equaions wih consan coefficiens y = a y +... + a
More informationSTABILITY OF PEXIDERIZED QUADRATIC FUNCTIONAL EQUATION IN NON-ARCHIMEDEAN FUZZY NORMED SPASES
Novi Sad J. Mah. Vol. 46, No. 1, 2016, 15-25 STABILITY OF PEXIDERIZED QUADRATIC FUNCTIONAL EQUATION IN NON-ARCHIMEDEAN FUZZY NORMED SPASES N. Eghbali 1 Absrac. We deermine some sabiliy resuls concerning
More information15. Vector Valued Functions
1. Vecor Valued Funcions Up o his poin, we have presened vecors wih consan componens, for example, 1, and,,4. However, we can allow he componens of a vecor o be funcions of a common variable. For example,
More informationSTATE-SPACE MODELLING. A mass balance across the tank gives:
B. Lennox and N.F. Thornhill, 9, Sae Space Modelling, IChemE Process Managemen and Conrol Subjec Group Newsleer STE-SPACE MODELLING Inroducion: Over he pas decade or so here has been an ever increasing
More informationComputer-Aided Analysis of Electronic Circuits Course Notes 3
Gheorghe Asachi Technical Universiy of Iasi Faculy of Elecronics, Telecommunicaions and Informaion Technologies Compuer-Aided Analysis of Elecronic Circuis Course Noes 3 Bachelor: Telecommunicaion Technologies
More information5. Stochastic processes (1)
Lec05.pp S-38.45 - Inroducion o Teleraffic Theory Spring 2005 Conens Basic conceps Poisson process 2 Sochasic processes () Consider some quaniy in a eleraffic (or any) sysem I ypically evolves in ime randomly
More informationVariational Iteration Method for Solving System of Fractional Order Ordinary Differential Equations
IOSR Journal of Mahemaics (IOSR-JM) e-issn: 2278-5728, p-issn: 2319-765X. Volume 1, Issue 6 Ver. II (Nov - Dec. 214), PP 48-54 Variaional Ieraion Mehod for Solving Sysem of Fracional Order Ordinary Differenial
More informationLecture 3: Fourier transforms and Poisson summation
Mah 726: L-funcions and modular forms Fall 2 Lecure 3: Fourier ransforms and Poisson summaion Insrucor: Henri Darmon Noes wrien by: Luca Candelori In he las lecure we showed how o derive he funcional equaion
More informationThe minimum number of nonnegative edges in hypergraphs
The minimum number of nonnegaive edges in hypergraphs Hao Huang DIMACS Rugers Universiy New Brunswic, USA huanghao@mahiasedu Benny Sudaov Deparmen of Mahemaics ETH 8092 Zurich, Swizerland benjaminsudaov@mahehzch
More informationR t. C t P t. + u t. C t = αp t + βr t + v t. + β + w t
Exercise 7 C P = α + β R P + u C = αp + βr + v (a) (b) C R = α P R + β + w (c) Assumpions abou he disurbances u, v, w : Classical assumions on he disurbance of one of he equaions, eg. on (b): E(v v s P,
More informationT L. t=1. Proof of Lemma 1. Using the marginal cost accounting in Equation(4) and standard arguments. t )+Π RB. t )+K 1(Q RB
Elecronic Companion EC.1. Proofs of Technical Lemmas and Theorems LEMMA 1. Le C(RB) be he oal cos incurred by he RB policy. Then we have, T L E[C(RB)] 3 E[Z RB ]. (EC.1) Proof of Lemma 1. Using he marginal
More informationChapter 6. Systems of First Order Linear Differential Equations
Chaper 6 Sysems of Firs Order Linear Differenial Equaions We will only discuss firs order sysems However higher order sysems may be made ino firs order sysems by a rick shown below We will have a sligh
More informationRobotics I. April 11, The kinematics of a 3R spatial robot is specified by the Denavit-Hartenberg parameters in Tab. 1.
Roboics I April 11, 017 Exercise 1 he kinemaics of a 3R spaial robo is specified by he Denavi-Harenberg parameers in ab 1 i α i d i a i θ i 1 π/ L 1 0 1 0 0 L 3 0 0 L 3 3 able 1: able of DH parameers of
More informationBEng (Hons) Telecommunications. Examinations for / Semester 2
BEng (Hons) Telecommunicaions Cohor: BTEL/14/FT Examinaions for 2015-2016 / Semeser 2 MODULE: ELECTROMAGNETIC THEORY MODULE CODE: ASE2103 Duraion: 2 ½ Hours Insrucions o Candidaes: 1. Answer ALL 4 (FOUR)
More informationA Note on Superlinear Ambrosetti-Prodi Type Problem in a Ball
A Noe on Superlinear Ambrosei-Prodi Type Problem in a Ball by P. N. Srikanh 1, Sanjiban Sanra 2 Absrac Using a careful analysis of he Morse Indices of he soluions obained by using he Mounain Pass Theorem
More informationt j i, and then can be naturally extended to K(cf. [S-V]). The Hasse derivatives satisfy the following: is defined on k(t) by D (i)
A NOTE ON WRONSKIANS AND THE ABC THEOREM IN FUNCTION FIELDS OF RIME CHARACTERISTIC Julie Tzu-Yueh Wang Insiue of Mahemaics Academia Sinica Nankang, Taipei 11529 Taiwan, R.O.C. May 14, 1998 Absrac. We provide
More informationCOALESCENT RANDOM WALKS ON GRAPHS
COALESCENT RANDOM WALKS ON GRAPHS JIANJUN PAUL TIAN AND ZHENQIU LIU Absrac. Inspired by coalescen heory in biology, we inroduce a sochasic model called muli-person simple random walks or coalescen random
More informationClass Meeting # 10: Introduction to the Wave Equation
MATH 8.5 COURSE NOTES - CLASS MEETING # 0 8.5 Inroducion o PDEs, Fall 0 Professor: Jared Speck Class Meeing # 0: Inroducion o he Wave Equaion. Wha is he wave equaion? The sandard wave equaion for a funcion
More informationCircuit Variables. AP 1.1 Use a product of ratios to convert two-thirds the speed of light from meters per second to miles per second: 1 ft 12 in
Circui Variables 1 Assessmen Problems AP 1.1 Use a produc of raios o conver wo-hirds he speed of ligh from meers per second o miles per second: ( ) 2 3 1 8 m 3 1 s 1 cm 1 m 1 in 2.54 cm 1 f 12 in 1 mile
More informationSecond quantization and gauge invariance.
1 Second quanizaion and gauge invariance. Dan Solomon Rauland-Borg Corporaion Moun Prospec, IL Email: dsolom@uic.edu June, 1. Absrac. I is well known ha he single paricle Dirac equaion is gauge invarian.
More informationAverage Number of Lattice Points in a Disk
Average Number of Laice Poins in a Disk Sujay Jayakar Rober S. Sricharz Absrac The difference beween he number of laice poins in a disk of radius /π and he area of he disk /4π is equal o he error in he
More informationLinear Response Theory: The connection between QFT and experiments
Phys540.nb 39 3 Linear Response Theory: The connecion beween QFT and experimens 3.1. Basic conceps and ideas Q: How do we measure he conduciviy of a meal? A: we firs inroduce a weak elecric field E, and
More informationCERTAIN CLASSES OF SOLUTIONS OF LAGERSTROM EQUATIONS
SARAJEVO JOURNAL OF MATHEMATICS Vol.10 (22 (2014, 67 76 DOI: 10.5644/SJM.10.1.09 CERTAIN CLASSES OF SOLUTIONS OF LAGERSTROM EQUATIONS ALMA OMERSPAHIĆ AND VAHIDIN HADŽIABDIĆ Absrac. This paper presens sufficien
More informationRainbow saturation and graph capacities
Rainbow sauraion and graph capaciies Dániel Korándi Absrac The -colored rainbow sauraion number rsa (n, F ) is he minimum size of a -edge-colored graph on n verices ha conains no rainbow copy of F, bu
More information2.7. Some common engineering functions. Introduction. Prerequisites. Learning Outcomes
Some common engineering funcions 2.7 Inroducion This secion provides a caalogue of some common funcions ofen used in Science and Engineering. These include polynomials, raional funcions, he modulus funcion
More informationLie Derivatives operator vector field flow push back Lie derivative of
Lie Derivaives The Lie derivaive is a mehod of compuing he direcional derivaive of a vecor field wih respec o anoher vecor field We already know how o make sense of a direcional derivaive of real valued
More informationIntroduction to Probability and Statistics Slides 4 Chapter 4
Inroducion o Probabiliy and Saisics Slides 4 Chaper 4 Ammar M. Sarhan, asarhan@mahsa.dal.ca Deparmen of Mahemaics and Saisics, Dalhousie Universiy Fall Semeser 8 Dr. Ammar Sarhan Chaper 4 Coninuous Random
More informationKinematics and kinematic functions
Kinemaics and kinemaic funcions Kinemaics deals wih he sudy of four funcions (called kinemaic funcions or KFs) ha mahemaically ransform join variables ino caresian variables and vice versa Direc Posiion
More information