A Family of Reversible BCH Codes

Size: px
Start display at page:

Download "A Family of Reversible BCH Codes"

Transcription

1 1 A Faily of Reversible BCH Codes Shuxing Li, Cunsheng Ding, and Hao Liu Abstract arxiv: v1 [cs.it] 7 Aug 016 Cyclic codes are an interesting class of linear codes due to their efficient encoding and decoding algiths as well as their theetical iptance. BCH codes f a subclass of cyclic codes and are very iptant in both they and practice as they have good err-crecting capability and are widely used in counication systes, stage devices and consuer electronics. However, the diension and iniu distance of BCH codes are not known in general. The objective of this paper is to study the diension and iniu distance of a faily of BCH codes over finite fields, i.e., a class of reversible BCH codes. I. INTRODUCTION Throughout this paper, let p be a prie and let q be a power of p. An [n,k,d] linear code C over GF(q) is a k-diensional subspace of GF(q) n with iniu (Haing) distance d. A linear code C over GF(q) is called a linear code with copleentary dual (in sht, LCD) if C C ={0}, where C denotes the dual of C. An [n,k] linear code C is called cyclic if (c 0,c 1,,c n 1 ) C iplies (c n 1,c 0,c 1,,c n ) C. By identifying any vect (c 0,c 1,,c n 1 ) GF(q) n with c 0 + c 1 x+c x + +c n 1 x n 1 GF(q)[x]/(x n 1), any code C of length n over GF(q) cresponds to a subset of the quotient ring GF(q)[x]/(x n 1). A linear code C is cyclic if and only if the cresponding subset is an ideal of the ring GF(q)[x]/(x n 1). Note that every ideal of GF(q)[x]/(x n 1) is principal. Let C = g(x) be a cyclic code, where g(x) is onic and has the sallest degree aong all the eleents of C. Then g(x) is unique and called the generat polynoial, and h(x)=(x n 1)/g(x) is referred to as the parity-check polynoial of C. Let f(x) GF(q)[x] be a polynoial with degree l, then the reciprocal polynoial of f is defined to be f R (x)=x l f(x 1 ). f is called self-reciprocal if and only if f(x)= f R (x). A cyclic code C with generat polynoial g(x) is called reversible if g(x) is self-reciprocal. The reversibility iplies if then (c 0,c 1,...,c n 1 ) C, (c n 1,c n,...,c 0 ) C. It is easily seen that reversible cyclic codes are LCD codes. Let 1 be a positive integer and let n=q 1. Let α be a generat of GF(q ). F any i with 1 i q, let i (x) denote the inial polynoial of α i over GF(q). F any δ<n, define g + (q,,δ) (x)=lc( 1(x), (x),, δ 1 (x)), and g (q,,δ) (x)=lc( n δ+1(x), n δ+ (x),, n 1 (x)). S. Li is with the Departent of Matheatics, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong, China (E-ail: lsxlsxlsx1987@gail.co). C. Ding is with the Departent of Coputer Science and Engineering, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong, China (E-ail: cding@ust.hk). H. Liu is with the Departent of Coputer Science and Engineering, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong, China (E-ail: hliuar@connect.ust.hk).

2 where lc denotes the least coon ultiple of these inial polynoials. Let C (q,,δ) denote the cyclic code of length n with generat polynoial g + (q,,δ) (x). This code C (q,,δ) is called the narrowsense priitive BCH code with designed distance δ. The codes C (q,,δ) have been studied in series of papers, including [1], [3], [4], [5], [7], [8], [9], [11], [1], [16], [18], [5]. However, the diension and iniu distance of the codes C (q,,δ) are still open in general. F any δ<(n+)/, define g (q,,δ) (x)=lc(g (q,,δ) (x),g+ (q,,δ) (x)). Let C (q,,δ) denote the cyclic code of length n with generat polynoial g (q,,δ) (x). C (q,,δ) is a reversible cyclic code which was studied by Massey f the data stage applications [19]. F the code C (q,,δ) with length n and iniu distance d, it was shown in [4] that { d = δ if δ n, d δ+1 otherwise. Meover, if we consider the even-like subcode of C (q,,δ), naely, the code C (q,,δ) with length n and generat polynoial g (q,,δ) (x)=(x 1) g (q,,δ) (x), its iniu distance is at least δ by the BCH bound. Hence, a potential great iproveent on the iniu distance is expected by considering the even-like subcode of C (q,,δ). This intuition otivates us to study the code C (q,,δ), which is a reversible BCH code. Recently, LCD codes have found an iptant application in cryptography [6]. Meover, it was shown that asyptotically good LCD codes exist [13], [0], [3]. These are our aj otivations of studying reversible BCH codes, which are a special class of LCD codes. The objective of this paper is to study the fundaental paraeters, naely diensions and iniu distances of the reversible BCH codes C (q,,δ). II. THE DIMENSION OF THE REVERSIBLE BCH CODES C (q,,δ) Our task in this section is to study the diension of the codes C (q,,δ). It is in general a hard proble to deterine the diension of a BCH code. A. The diension of C (q,,δ) when δ is relatively sall In [9], the auths derived the diension of the narrow-sense priitive BCH code C (q,,δ) when δ is relatively sall. In this subsection, we develop siilar results f the diension of the reversible BCH code C (q,,δ). Any positive integer s with 0 s n has a unique q-ary expansion as s= i=0 s iq i, where 0 s i q 1. We use C δ to denote the q-cyclotoic coset in Z n containing δ, which is defined by C δ ={δq i od n : 0 i }. We use cl(δ) to denote the coset leader of C δ, which is the sallest integer in C δ. The q-ary expansion sequence of s= i=0 s iq i is denoted as s=(s,s,...,s 0 ). Below, we siply call the q-ary expansion sequence of s as the sequence of s, whenever this causes no confusion. The weight of s is defined to be the nuber of nonzero entries aong s and denoted by wt(s). Define the suppt of s as supp(s)={0 i s i 0}. We have the following properties regarding q-cyclotoic cosets odulo n=q 1. Lea 1. Let and n=q 1. Then we have the following.

3 3 1) When is odd, f 1 i q (+1)/, C i = C i =. F 1 i, j q (+1)/, j C i, equivalently j C i, if and only if j q l i (od n) f soe 0 l. ) When is even, C q / +1 = C q / 1 = and C i = C i = f 1 i q /, i q / +1. F 1 i, j q /, j C i, equivalently j C i, if and only if f soe 0 l. j q l i (od n) Proof: 1) The proof is essentially the sae as that of [9, Thee 3] (see also [1, Leas 8,9]), and is oitted. ) The proof is essentially the sae as that of [9, Thee 3], and is oitted. Lea. Let and let n=q 1. Then the following stateents hold. 1) When is odd, f 1 i, j q (+1)/, j C i if and only if i=(0,...,0,q 1,...,q 1,u), j=(0,...,0,q 1 u,q 1,...,q 1), 1 3 i=(0,...,0,q 1 u,q 1,...,q 1), 3 j=(0,...,0,q 1,...,q 1,u), where 0 u q 1. ) When is even and q>, f 1 i, j q /, j C i if and only if i=(0,...,0, 1,q 1,...,q 1,q ), 1 j =(0,...,0, 1,q 1,...,q 1,q ), 1 i=(0,...,0,q 1,...,q 1,q ), 1 1 j=(0,...,0, 1,q 1,...,q 1), 1 i=(0,...,0, 1,q 1,...,q 1), 1 j=(0,...,0,q 1,...,q 1,q ), 1 1 i=(0,...,0,q 1,...,q 1), 1 j =(0,...,0,q 1,...,q 1). 1 1

4 4 3) When is even and q=, f 1 i, j (/)+1, j C i if and only if i=(0,...,0, 1,...,1), j =(0,...,0, 1,...,1), i=(0,...,0, 1,...,1), j =(0,...,0, 1,...,1), i=(0,...,0, 1 1,...,1), j =(0,...,0, 1 1,...,1), i=(0,...,0, 1,0,1,...,1), j=(0,...,0, 1,...,1,0,1), i=(0,...,0, 1,...,1,0,1), j=(0,...,0, 1,0,1,...,1). Proof: 1) If j C i, then there exists an l with 0 l, such that q l i+ j 0 (od n). Hence, q l i+ j=(q 1,q 1,...,q 1). Since =wt(q l i+ j) wt(i)+wt( j) +1, we have {wt(i),wt( j)}={ } {wt(i),wt( j)}= { +1 }. If {wt(i),wt( j)} = {, +1 }, then clearly, supp(ql i) supp( j) = /0. Otherwise, if supp(q l i) supp( j) /0, there is at least one entry in q l i+ j, which is not q 1. Hence, q l i and j ust have the following two fs q l i=(q 1,...,q 1,0,...,0), +1 j =(0,...,0,q 1,...,q 1), q l i=(q 1,...,q 1,0,...,0), j =(0,...,0,q 1,...,q 1), 3, +1

5 5 If {wt(i),wt( j)}={ +1 }, then clearly, supp(ql i) supp( j) 1. If supp(q l i) supp( j) >1, then there is at least one entry in q l i+ j, which is not q 1. Hence, supp(q l i) supp( j) =1. Therefe, q l i and j ust have the following q 4 fs q l i=(q 1,...,q 1,u,0,...,0), +1 j =(0,...,0,q 1 u,q 1,...,q 1), q l i=(q ,...,q 1, 0,...,0,u), j =(0,...,0,q 1,...,q 1,q 1 u), where 1 u q. Therefe, the conclusion follows. ) If j C i, then there exists an l with 0 l, such that q l i+ j 0 (od n). Hence, q l i+ j=(q 1,q 1,...,q 1). Since =wt(q l i+ j) wt(i)+wt( j) +, we ust have { + 1}, { {wt(i),wt( j)}=, + 1}, { 1, + 1}, { }. If {wt(i),wt( j)}={ +1}, then supp(ql i) supp( j) =. Hence, q l i and j ust have the following f q l i=(q 1,...,q 1,q, 0,...,0,1), 1 +1 j=(0,...,0, 1,q 1,...,q 1,q ). 1 If {wt(i),wt( j)}={, + 1}, then supp(ql i) supp( j) =1. Hence, q l i and j ust have the following two fs q l i=(q 1,...,q 1,q,0,...,0), +1 j=(0,...,0, 1,q 1,...,q 1), 1 q l i=(q 1,...,q 1, 0,...,0,1), 1 j=(0,...,0,q 1,...,q 1,q ). 1 1 If {wt(i),wt( j)} = { 1, + 1}, then supp(ql i) supp( j) = 0. Hence, there is at least one entry in (q l i+ j) which is not equal to q 1. If {wt(i),wt( j)}={ }, then supp(ql i) supp( j) =0. Hence, q l i and j ust have the following f i=(q 1,...,q 1,0,...,0), j=(0,...,0,q 1,...,q 1). 1

6 6 Therefe, the conclusion follows. 3) The proof is siilar to that of ) and is oitted here. As a consequence, we have the following proposition. Proposition 3. Let and n=q 1. 1) Suppose is odd. Then ) Suppose is even and q>. Then 3) Suppose is even and q=. Then {(cl(i),cl( j)) j C i,1 i, j l} 0 if 1 l q (+1)/ q, = h if l = q (+1)/ q+h, 1 h q, (q 1) if q (+1)/ 1 l q (+1)/. {(cl(i),cl( j)) j C i,1 i, j l} 0 if 1 l q /, 1 if q / 1 l q / 3, = if l = q /, 4 if q / 1 l q /. {(cl(i),cl( j)) j C i,1 i, j l} 0 if 1 l /, 1 if / 1 l (/)+1 4, = 3 if (/)+1 3 l (/)+1, 5 if (/)+1 1 l (/)+1. Cobining Lea 1 and Proposition 3, we have the following thee. Thee 4. Let and n=q 1. Given an integer δ (n+)/, let δ q and δ 0 be the unique integers such that δ 1=δ q q+δ 0, where 0 δ 0 < q. Then the diension k of the code C (q,,δ) is given below. 1) When is odd, { q (δ q (q 1)+δ 0 ) if δ q (+1)/ q, k= q (q ()/ 1)(q 1) if q (+1)/ q+1 δ q (+1)/ + 1. ) When is even and q>, q (δ q (q 1)+δ 0 ) if δ q / 1, q (δ q (q 1)+δ 0 1 ) if q/ δ q / + 1, k= q (δ q (q 1)+δ 0 1) if q / + δ q /, q (δ q (q 1)+δ 0 3 ) if δ=q/ 1, q (δ q (q 1)+δ 0 5 ) if q/ δ q / ) When is even and q=, (δ q + δ 0 ) if δ / 1 and 4, (δ q + δ 0 1 ) if / δ / + 1 and 4, k= (δ q + δ 0 1) if / + δ (/)+1 3 and 4, (δ q + δ 0 ) if (/)+1 δ (/)+1 1 and 6, (δ q + δ 0 3) if (/)+1 δ (/) and 6.

7 7 In addition, the iniu distance d of the code satisfies that d δ. Proof: Let g (q,,δ) (x) be the generat polynoial of C (q,,δ). F the diension of the code, we only prove ) since the proofs of 1) and 3) are siilar. By ) of Lea 1, the degree of g (q,,δ) (x) equals where 1+(δ q (q 1)+δ 0 ) ε {(cl(i),cl( j)) j C i,1 i, j δ 1}, ε= { 0 if δ q / + 1, 1 if δ q / +. Together with ) of Proposition 3, we have 1+(δ q (q 1)+δ 0 ) if δ q / 1, 1+(δ q (q 1)+δ 0 1 ) if q/ δ q / + 1, deg(g (q,,δ) (x))= 1+(δ q (q 1)+δ 0 1) if q / + δ q /, 1+(δ q (q 1)+δ 0 3 ) if δ=q/ 1, 1+(δ q (q 1)+δ 0 5 ) if q/ δ q / + 1. Therefe, the conclusion on the diension in ) follows. Meover, by the BCH bound, C (q,,δ) has iniu distance d δ. Reark 1. F the code C (q,,δ), if δ i=0 ( ) n (q 1) i > q n k, (1) i then d δ by the sphere packing bound. Therefe, the knowledge on the diension of the code C (q,,δ) ay provide e precise infation on the iniu distance in soe cases. As an illustration, we use Thee 4 and the inequality (1) to get soe binary codes C (,,δ) with d = δ, which are listed in Table I. TABLE I SOME BINARY CODE C (,,δ) WITH d = δ δ {5,6,7} {3} {8,9,10,11,1,13} {3,5} {14,15,17,17,18,19} {3,5,7} {0} {3,5,7,9} B. The diension of C (q,,δ) when δ=q λ and λ In [18], the diension of the narrow-sense priitive BCH code C (q,,δ) with δ=q λ is considered. The auth derived two closed fulas concerning the diension of such code. In this subsection, we use the idea in [18] to give an estiate of the diension of the reversible BCH code C (q,,δ) with δ=q λ, where λ. Let s and r be two positive integers. Given a sequence of length s and a fixed integer a with 0 a q 1, we say that the sequence contains a straight run of length r with respect to a, if it has r consecutive entries fed by a. If we view the sequence as a circle where the first and last entry are glued together, we say that the sequence contains a circular run of length r with respect to a, if this circle has r consecutive entries fed by a. When the specific choice of the integer a does not atter, we siply say that the sequence has a straight circular run of length r. Clearly, a straight run is also a circular run and the

8 8 converse is not necessarily true. We use l r (s) to denote the nuber of sequences of length s, which contains a straight run of length r. Particularly, we define l r (0)=0. The following is a recursive fula of l r (s) which was presented in [18]. Proposition 5. [18, p. 155] Let s and r be two nonnegative integers. Then 0 if 0 s<r, l r (s)= 1 if s=r, ql r (s 1)+(q 1)(q s r 1 l r (s r 1)) if s>r. Throughout the rest of this section, we always assue that δ = q λ and λ. Recall that the narrow-sense BCH code C (q,,δ) has generat polynoial g + (q,,δ)(x). Set r = λ. Note that δ 1 cresponds to following sequence δ 1=(0,...,0,q 1,q 1,...,q 1). }{{} λ 1 r The key observation in [18] is that f 1 i n 1, α i is a root of g + (q,,δ)(x) if and only if the sequence of i has a circular run of length at least r with respect to 0. Siilarly, note that n δ+1 cresponds to the following sequence n δ+1=(q 1,...,q 1, 0,0,...,0). }{{} λ 1 r Therefe, f 1 i n 1, α i is a root of g (q,,δ)(x) if and only if the sequence of i has a circular run of length at least r with respect to q 1. The following proposition presents the degree of g + (q,,δ)(x) and g (q,,δ) (x). Proposition 6. [18, p. 155] Set r= λ. Then deg(g + (q,,δ) (x))=deg(g (q,,δ) (x))=l r() 1+(q 1) r (r u 1)(q r u l r ( r u )). u=0 We have the following estiation on the diension of C (q,,δ). Thee 7. Set r= λ. The diension k of C (q,,δ) satisfies and k q l r ()+l r ( r) (q 1) r (r u 1)(q r u l r ( r u )), u=0 k q l r ()+l r ( r) (q 1) r (r u 1)(q r u l r ( r u )). u=0 Proof: Since λ, we have r. Define a set N ={1 i n 1 g+ (q,,δ) (αi )=g (q,,δ) (αi )=0}. Since g (q,,δ) (x)=lc(g (q,,δ) (x),x 1,g+ (q,,δ)(x)), we have deg(g (q,,δ) (x))=deg(g + (q,,δ) (x))+deg(g (q,,δ) (x))+1 N. Since deg(g + (q,,δ) (x)) and deg(g (q,,δ) (x)) are known by Proposition 6, it suffices to estiate the size of N. N contains the nuber 1 i n 1, such that i contains two runs of length r with respect to 0 and q 1, where at ost one of the is a circular run. Let N be the set of integers 1 i n such that the first r entries of i is a straight run of length r with respect to 0 and the last r entries contain a

9 9 straight run of length r with respect to q 1. Clearly, we have N =l r ( r). Note that each eleent of N is a proper cyclic shift of an eleent of N. Meover, f each i N, we have which iplies {q j i od n 0 j }, () N N N. Thus, the conclusion follows fro a direct coputation. III. THE MINIMUM DISTANCE OF THE REVERSIBLE BCH CODES C (q,,δ) While it is difficult to deterine the diension of reversible BCH codes in general, it is e difficult to find out the iniu distance of reversible BCH codes [8]. F the code C (q,,δ), the BCH bound d δ is usually very tight. But it would be better if we can deterine the iniu distance exactly. In this section, we deterine the iniu distance d of the code C (q,,δ) in soe special cases. Given a codewd c=(c 0,c 1,...,c n 1 ) C (q,,δ), we say c is reversible if (c n 1,c n,...,c 0 ) C (q,,δ). Naely, c C (q,,δ) is reversible if and only if c C (q,,δ). The following thee says that the reversible codewd in C (q,,δ) provides soe infation on the iniu distance on C (q,,δ). Thee 8. Let c(x) C (q,,δ) be a reversible codewd of weight w. If c(1) 0, then C (q,,δ) contains a codewd (x 1)c(x) whose weight is at ost w. Therefe the iniu distance d of C (q,,δ) satisfies d w. In particular, if the weight of c(x) is δ, then the iniu distance d = δ. Proof: Since c(x) is reversible and c(1) 0, we have (x 1)c(x) C (q,,δ). The weight of (x 1)c(x) is at ost w, which iplies d w. In particular, if w=δ, together with the BCH bound, we have d= δ. Let c(x)= i=0 n 1 c ix i be a codewd of a cyclic code C with length n=q 1. We can use the eleents of GF(q ) to index the coefficients of c(x). Siilarly, let C be the extended cyclic code of C and let c(x) = n i=0 c ix i be a codewd of C with length q. We can use the eleents of GF(q ) to index the coefficients of c(x). The suppt of c(x) (resp. c(x)) is defined to be the set of eleents in GF(q ) (resp. GF(q )), which crespond to the nonzero coefficients of c(x) (resp. c(x)). Given a prie power q and an integer 0 s q 1, s has a unique q-ary expansion s= i=0 s iq i. The q-weight of s is defined to be wt q (s)= i=0 s i. Suppose H is a subset of GF(q), then we use H ( 1) to denote the subset {h 1 h H}. The following are two classes of reversible BCH codes whose iniu distances are known. Collary 9. F the reversible BCH code C (q,,δ), we have d = δ if δ n. Proof: It suffices to find a codewd c(x) satisfying the condition in Thee 8. If δ n, by the proof of [4, Thee], C (q,,δ) contains a reversible codewd c(x) with weight δ, where c(x)= δ 1 i=0 a ix ni δ and c(1) 0. The desired conclusion then follows fro Thee 8. Collary 10. Let δ= r 1 and V be an -diensional vect space over GF(). Suppose 1 r, then we can choose four r-diensional subspaces of V, say H i, 1 i 4 of V, such that H 1 H ={0} and H 3 H 4 ={0}. If ((H 1 H )\{0}) ( 1) =(H 3 H 4 )\{0}, then the reversible BCH code C (,,δ) has iniu distance d = δ. Proof: Define C + (,,δ) (resp. C (,,δ)) to be the BCH code with length n and generat polynoial g + (,,δ) (x) (resp. g (,,δ) (x)). Let α be a priitive eleent of GF( ). We can assue the zeros of C + (,,δ) (resp. C (,,δ) ) include the eleents {αi 1 i δ 1} (resp. {α i 1 i δ 1}). The BCH code C + (,,δ) (resp. C (,,δ) ) contains a punctured Reed-Muller code RM+ ( r,) (resp. RM ( r,) ) as a subcode, in which RM + ( r,) has zeros {α i 0<i< 1,wt (i)<r}

10 10 and RM ( r,) has zeros {α i 0<i< 1,wt (i)<r}. Let c=(c 0,c 1,...,c n 1 ) be a codewd of RM + ( r,). Since RM + ( r,) is a cyclic code, its codinates can be indexed in the following way c=(c 0 1,c 1 α,...,c n 1 α n 1 ), (3) where n 1 j=0 c jα i j = 0 f each 1 i δ 1. Siilarly, suppose c =(c 0,c 1,...,c n 1 ) is a codewd of RM ( r,). Then, its codinates can be indexed in the following way c =(c 0 1, c 1 α 1,..., c n 1 α (n 1) ), (4) where n 1 j=0 c j α i j = 0 f each 1 i δ 1. By [, Collary 5.3.3], RM + ( r,) contains two iniu weight codewds c 1 (x) and c (x), such that the suppt of c 1 (x) and c (x) are H 1 \{0} and H \{0} respectively. Siilarly, RM ( r,) contains two iniu weight codewds c 3 (x) and c 4 (x), such that the suppt of c 3 (x) and c 4 (x) are H 3 \{0} and H 4 \{0} respectively. Meover, the codinates of c 1 (x) and c (x) are arranged in the way of (3) and the codinates of c 3 (x) and c 4 (x) are arranged in the way of (4). Therefe, c 1 (x)+c (x) RM + ( r,) C + (,,δ) and c 3 (x)+c 4 (x) RM ( r,) C (,,δ). Since ((H 1 H )\{0}) ( 1) =(H 3 H 4 )\{0}, by the arrangeent of the codinates of c i (x), 1 i 4, the two codewds c 1 (x)+c (x) and c 3 (x)+c 4 (x) coincide. Thus, we have c 1 (x)+c (x) C (,,δ). Since c 1 (1)+c (1)=0, we have a codewd c 1 (x)+c (x) C (,,δ) with weight δ. Exaple 1. Let q =, = 5 and δ = 3. We consider the iniu distance of C (,5,3). Let α be a priitive eleent of GF( 5 ) and the inial polynoial of α over GF() is x 5 + x + 1. Then we have the following four -diensional subspaces of GF( 5 ): H 1 ={0,α,α,α 19 }, H ={0,α 8,α 1,α 18 }, H 3 ={0,α 1,α 13,α 30 }, H 4 ={0,α 19,α 3,α 9 }. Thus, we have c 1 (x) and c (x) as codewds of C + (,5,3), whose suppts are H 1\{0} and H \{0}. We have c 3 (x) and c 4 (x) as codewds of C (,5,3), whose suppts are H 3\{0} and H 4 \{0}. Clearly, ((H 1 H )\{0}) ( 1) =(H 3 H 4 )\{0}. Therefe, c 1 (x)+c (x) coincides with c 3 (x)+c 4 (x), whose weight is six. Consequently, c 1 (x)+c (x) C (,5,3) and the iniu distance of C (,5,3) equals 6. Based on our nuerical experient, we have the following conjecture, which can be regarded as an analogy of [17, Chapter 9, Thee 5]. Conjecture 1. Let δ=q λ 1, where 1 λ /. Then the code C (q,,δ) has iniu distance d= δ.

11 11 IV. THE PARAMETERS OF THE REVERSIBLE CODE C (q,,δ) FOR SMALL δ In this section, we deterine the paraeters of the code C (q,,δ) f a few sall values of δ. With the help of Thee 4 and Collary 9, we can achieve this in soe cases. Recall that the Melas code over GF(q) is a cyclic code with length n=q 1 and generat polynoial 1 (x) 1 (x) and was first studied by Melas f the case q= [1]. The weight distribution of the Melas code has been obtained f q=,3 [14], []. F δ=, the code C (q,,δ) is the even-like subcode of the Melas code. The following thee is a direct consequence of Thee 4 and Collary 9. Thee 11. Suppose q is odd and, then C (q,,) has paraeters [q 1,q,4]. When δ=3, we have the following result. Thee 1. 1) When q= and 4, C (q,,3) has paraeters [ 1,,6]. ) When q 1 (od 3) and 4, C (q,,3) has paraeters [q 1,q 4,6]. Proof: 1) The diension follows fro Thee 4. Applying the BCH and the sphere packing bound, we can see that the iniu distance is 6. ) The diension follows fro Thee 4. Since q 1 (od 3), we have 3 n. Therefe, by Collary 9, the iniu distance is 6. Thee 13. Suppose 3, then C (3,,4) has paraeters [3 1,3 4,d], where d = 8 if is even and d 8 if is odd. Proof: It follows fro Thee 4 that the diension of this code is equal to q 4. By the BCH bound, the iniu distance of C (3,,4) is at least 8. When is even, 4 divides n. Hence, the iniu distance of C (3,,4) is equal to 8 accding to Collary 9. We have the following conjecture concerning the case q=3. Conjecture. When δ=4, 3 is odd, and q=3, C (q,,δ) has iniu distance d = 8. Exaple. Let =3 and q=3. Let α be a generat of GF(3 3 ) with α 3 α+1 = 0. Then C (q,,δ) has paraeters [6, 13, 8] and generat polynoial x 13 + x 1 + x 11 + x 10 + x 8 + x 5 + x 3 + x + x+. This is the best ternary cyclic code and has the sae paraeters as the best linear code with the sae length and diension. V. CONCLUDING REMARKS In this paper, we deterined the diension of the reversible BCH code C (q,,δ) when δ is relatively sall, and developed lower and upper bounds on its diension f δ = q λ, where λ. We deterined the iniu distance of C (q,,δ) in two special cases. Meover, we settled the paraeters of the code C (q,,δ) f soe very sall δ. However, the paraeters of the reversible BCH codes C (q,,δ) are still open in ost cases. It would be nice if further progress on the deterination of the paraeters of the codes C (q,,δ) can be ade. Accding to the tables of best cyclic codes docuented in [10], the binary reversible BCH code C (q,,δ) is the best possible cyclic code in alost all cases (see Table II). Hence, it is wthwhile to study the code C (q,,δ).

12 1 TABLE II EXAMPLES OF BINARY REVERSIBLE BCH CODE C (,,δ) n k d δ Best cyclic? Optial? Yes Yes Yes Yes Yes Yes No No Yes Yes Yes Unknown Yes No Yes Unknown Yes No Yes Yes REFERENCES [1] S. A. Aly, A. Klappenecker and P. K. Sarvepalli, On quantu and classical BCH codes, IEEE Trans. Inf. They, vol. 53, no. 3, pp , 007. [] E.F. Assus and J. D. Key, Designs and Their Codes, Cabridge University Press, Cabridge, 199. [3] D. Augot, P. Charpin and N. Sendrier, Studying the locat polynoials of iniu weight codewds of BCH codes, IEEE Trans. Inf. They, vol. 38, no. 3, pp , 199. [4] D. Augot and N. Sendrier, Idepotents and the BCH bound, IEEE Trans. Inf. They, vol. 40, no. 1, pp , [5] E. R. Berlekap, The enueration of infation sybols in BCH codes, Bell Syste Tech. J., vol. 46, no. 8, pp , [6] C. Carlet and S. Guilley, Copleentary dual codes f counter-easures to side-channel attacks, in: R. Pinto et al. (eds.), Coding They and Applications, CIM Series in Matheatical Sciences 3, pp , Springer, 015. [7] P. Charpin, On a class of priitive BCH-codes, IEEE Trans. Inf. They, vol. 36, no. 1, pp. 8, [8] P. Charpin, Open probles on cyclic codes, In: V.S. Pless, W.C. Huffan (Eds.), Handbook of Coding They, vol. I, pp (Chapter 11), Elsevier, Asterda, [9] Y. Dianwu and H. Zhenging, On the diension and iniu distance of BCH codes over GF(q), J. of Electronics, vol. 13, no. 3, pp. 16 1, July [10] C. Ding, Codes fro Difference Sets, Wld Scientific, Singape, 015. [11] C. Ding, X. Du and Z. Zhou, The Bose and iniu distance of a class of BCH codes, IEEE Trans. Inf. They, vol. 61, no. 5, pp , 015. [1] C. Ding, Paraeters of several classes of BCH codes, IEEE Trans. Inf. They, vol. 61, no. 10, pp , 015. [13] M. Esaeili and S. Yari, On copleentary-dual quasi-cyclic codes, Finite Fields and Their Applications, vol. 15, pp , 009. [14] G. van der Geer, R. Schoof, and M. van der Vlugt, Weight fulas f the ternary Melas codes, Matheatics of Coputation, vol. 58, no. 198, pp , 199. [15] W. C. Huffan and V. Pless, Fundaentals of Err-Crecting Codes, Cabridge University Press, Cabridge, 003. [16] T. Kasai and S. Lin, Soe results on the iniu weight of priitive BCH codes, IEEE Trans. Inf. They, vol. 18, no. 6, pp , 197. [17] F. J. MacWillias and N. J. A. Sloane, The They of Err-Crecting Codes, Nth-Holland, Asterda, [18] H. B. Mann, On the nuber of infation sybols in Bose-Chaudhuri codes, Infation and Control, vol. 5, no., pp , 196. [19] J. L. Massey, Reversible codes, Infation and Control, vol. 7, no. 3, pp , [0] J. L. Massey, Linear codes with copleentary duals, Discret. Math. vol , pp , 199. [1] C. M. Melas, A cyclic code f double err crection, IBM J. Res. Develop., vol. 4, pp , [] R. Schroof and M. van der Vlugt, Hecke operats and the weight distribution of certain codes, J. Cob. They Ser. A, vol. 57, pp , [3] N. Sendrier, Linear codes with copleentary duals eet the Gilbert-Varshaov bound, Discret. Math., vol. 85, pp , 004. [4] K. K. Tzeng and C. R. P. Hartann, On the iniu distance of certain reversible cyclic codes, IEEE Trans. Inf. They, vol. 16, no. 5, pp , [5] D. Yue and G. Feng, Miniu cyclotoic coset representatives and their applications to BCH codes and Goppa codes, IEEE Trans. Inf. They, vol. 46, no. 7, pp , 000.

The Dimension and Minimum Distance of Two Classes of Primitive BCH Codes

The Dimension and Minimum Distance of Two Classes of Primitive BCH Codes 1 The Dimension and Minimum Distance of Two Classes of Primitive BCH Codes Cunsheng Ding, Cuiling Fan, Zhengchun Zhou Abstract arxiv:1603.07007v1 [cs.it] Mar 016 Reed-Solomon codes, a type of BCH codes,

More information

THROUGHOUT this paper, let q be a power of a prime p.

THROUGHOUT this paper, let q be a power of a prime p. 4344 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 63, NO. 7, JULY 017 LCD Cyclic Codes Over Finite Fields Chengju Li, Cunsheng Ding, Shuxing Li Abstract In addition to their applications in data storage,

More information

Cyclic Codes from the Two-Prime Sequences

Cyclic Codes from the Two-Prime Sequences Cunsheng Ding Department of Computer Science and Engineering The Hong Kong University of Science and Technology Kowloon, Hong Kong, CHINA May 2012 Outline of this Talk A brief introduction to cyclic codes

More information

This article was originally published in a journal published by Elsevier, and the attached copy is provided by Elsevier for the author s benefit and for the benefit of the author s institution, for non-coercial

More information

The simplest method for constructing APN polynomials EA-inequivalent to power functions

The simplest method for constructing APN polynomials EA-inequivalent to power functions The siplest ethod for constructing APN polynoials EA-inequivalent to power functions Lilya Budaghyan Abstract The first APN polynoials EA-inequivalent to power functions have been constructed in [7, 8]

More information

Construction of Some New Classes of Boolean Bent Functions and Their Duals

Construction of Some New Classes of Boolean Bent Functions and Their Duals International Journal of Algebra, Vol. 11, 2017, no. 2, 53-64 HIKARI Ltd, www.-hikari.co https://doi.org/10.12988/ija.2017.61168 Construction of Soe New Classes of Boolean Bent Functions and Their Duals

More information

Divisibility of Polynomials over Finite Fields and Combinatorial Applications

Divisibility of Polynomials over Finite Fields and Combinatorial Applications Designs, Codes and Cryptography anuscript No. (will be inserted by the editor) Divisibility of Polynoials over Finite Fields and Cobinatorial Applications Daniel Panario Olga Sosnovski Brett Stevens Qiang

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

arxiv: v1 [math.co] 19 Apr 2017

arxiv: v1 [math.co] 19 Apr 2017 PROOF OF CHAPOTON S CONJECTURE ON NEWTON POLYTOPES OF q-ehrhart POLYNOMIALS arxiv:1704.0561v1 [ath.co] 19 Apr 017 JANG SOO KIM AND U-KEUN SONG Abstract. Recently, Chapoton found a q-analog of Ehrhart polynoials,

More information

AN APPLICATION OF INCOMPLETE BLOCK DESIGNS. K. J. C. Smith University of North Carolina. Institute of Statistics Mimeo Series No. 587.

AN APPLICATION OF INCOMPLETE BLOCK DESIGNS. K. J. C. Smith University of North Carolina. Institute of Statistics Mimeo Series No. 587. AN APPLICATION OF INCOMPLETE BLOCK DESIGNS TO THE CONSTRUCTION OF ERROR-CORRECTING CODES by K. J. C. Sith University of North Carolina Institute of Statistics Mieo Series No. 587 August, 1968 This research

More information

THE SUPER CATALAN NUMBERS S(m, m + s) FOR s 3 AND SOME INTEGER FACTORIAL RATIOS. 1. Introduction. = (2n)!

THE SUPER CATALAN NUMBERS S(m, m + s) FOR s 3 AND SOME INTEGER FACTORIAL RATIOS. 1. Introduction. = (2n)! THE SUPER CATALAN NUMBERS S(, + s FOR s 3 AND SOME INTEGER FACTORIAL RATIOS XIN CHEN AND JANE WANG Abstract. We give a cobinatorial interpretation for the super Catalan nuber S(, + s for s 3 using lattice

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3 A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)

More information

Algebraic Montgomery-Yang problem: the log del Pezzo surface case

Algebraic Montgomery-Yang problem: the log del Pezzo surface case c 2014 The Matheatical Society of Japan J. Math. Soc. Japan Vol. 66, No. 4 (2014) pp. 1073 1089 doi: 10.2969/jsj/06641073 Algebraic Montgoery-Yang proble: the log del Pezzo surface case By DongSeon Hwang

More information

ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS

ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS #A34 INTEGERS 17 (017) ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS Jürgen Kritschgau Departent of Matheatics, Iowa State University, Aes, Iowa jkritsch@iastateedu Adriana Salerno

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

Narrow-Sense BCH Codes over GF(q) with Length n= qm 1

Narrow-Sense BCH Codes over GF(q) with Length n= qm 1 Narrow-Sense BCH Codes over GFq) with Length n= qm 1 Shuxing Li, Cunsheng Ding, Maosheng Xiong, and Gennian Ge 1 Abstract arxiv:160.07009v [cs.it] 1 Nov 016 Cyclic codes are widely employed in communication

More information

An EGZ generalization for 5 colors

An EGZ generalization for 5 colors An EGZ generalization for 5 colors David Grynkiewicz and Andrew Schultz July 6, 00 Abstract Let g zs(, k) (g zs(, k + 1)) be the inial integer such that any coloring of the integers fro U U k 1,..., g

More information

Characterization of the Line Complexity of Cellular Automata Generated by Polynomial Transition Rules. Bertrand Stone

Characterization of the Line Complexity of Cellular Automata Generated by Polynomial Transition Rules. Bertrand Stone Characterization of the Line Coplexity of Cellular Autoata Generated by Polynoial Transition Rules Bertrand Stone Abstract Cellular autoata are discrete dynaical systes which consist of changing patterns

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

A note on the realignment criterion

A note on the realignment criterion A note on the realignent criterion Chi-Kwong Li 1, Yiu-Tung Poon and Nung-Sing Sze 3 1 Departent of Matheatics, College of Willia & Mary, Williasburg, VA 3185, USA Departent of Matheatics, Iowa State University,

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

MODULAR HYPERBOLAS AND THE CONGRUENCE ax 1 x 2 x k + bx k+1 x k+2 x 2k c (mod m)

MODULAR HYPERBOLAS AND THE CONGRUENCE ax 1 x 2 x k + bx k+1 x k+2 x 2k c (mod m) #A37 INTEGERS 8 (208) MODULAR HYPERBOLAS AND THE CONGRUENCE ax x 2 x k + bx k+ x k+2 x 2k c (od ) Anwar Ayyad Departent of Matheatics, Al Azhar University, Gaza Strip, Palestine anwarayyad@yahoo.co Todd

More information

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions Linear recurrences and asyptotic behavior of exponential sus of syetric boolean functions Francis N. Castro Departent of Matheatics University of Puerto Rico, San Juan, PR 00931 francis.castro@upr.edu

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

Polytopes and arrangements: Diameter and curvature

Polytopes and arrangements: Diameter and curvature Operations Research Letters 36 2008 2 222 Operations Research Letters wwwelsevierco/locate/orl Polytopes and arrangeents: Diaeter and curvature Antoine Deza, Taás Terlaky, Yuriy Zinchenko McMaster University,

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Matheatical Sciences 04,, p. 7 5 ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD M a t h e a t i c s Yu. A. HAKOPIAN, R. Z. HOVHANNISYAN

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

arxiv: v2 [math.co] 8 Mar 2018

arxiv: v2 [math.co] 8 Mar 2018 Restricted lonesu atrices arxiv:1711.10178v2 [ath.co] 8 Mar 2018 Beáta Bényi Faculty of Water Sciences, National University of Public Service, Budapest beata.benyi@gail.co March 9, 2018 Keywords: enueration,

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

Analysis of Polynomial & Rational Functions ( summary )

Analysis of Polynomial & Rational Functions ( summary ) Analysis of Polynoial & Rational Functions ( suary ) The standard for of a polynoial function is ( ) where each of the nubers are called the coefficients. The polynoial of is said to have degree n, where

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

MULTIPLAYER ROCK-PAPER-SCISSORS

MULTIPLAYER ROCK-PAPER-SCISSORS MULTIPLAYER ROCK-PAPER-SCISSORS CHARLOTTE ATEN Contents 1. Introduction 1 2. RPS Magas 3 3. Ites as a Function of Players and Vice Versa 5 4. Algebraic Properties of RPS Magas 6 References 6 1. Introduction

More information

EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS

EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS Zhi-Wei Sun Departent of Matheatics, Nanjing University Nanjing 10093, People s Republic of China zwsun@nju.edu.cn Abstract In this paper we establish soe explicit

More information

ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE

ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE CHRISTOPHER J. HILLAR Abstract. A long-standing conjecture asserts that the polynoial p(t = Tr(A + tb ] has nonnegative coefficients whenever is

More information

arxiv: v1 [cs.it] 31 May 2013

arxiv: v1 [cs.it] 31 May 2013 Noname manuscript No. (will be inserted by the editor) A Note on Cyclic Codes from APN Functions Chunming Tang Yanfeng Qi Maozhi Xu arxiv:1305.7294v1 [cs.it] 31 May 2013 Received: date / Accepted: date

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe PROPERTIES OF MULTIVARIATE HOMOGENEOUS ORTHOGONAL POLYNOMIALS Brahi Benouahane y Annie Cuyt? Keywords Abstract It is well-known that the denoinators of Pade approxiants can be considered as orthogonal

More information

Understanding Machine Learning Solution Manual

Understanding Machine Learning Solution Manual Understanding Machine Learning Solution Manual Written by Alon Gonen Edited by Dana Rubinstein Noveber 17, 2014 2 Gentle Start 1. Given S = ((x i, y i )), define the ultivariate polynoial p S (x) = i []:y

More information

DIOPHANTINE NUMBERS, DIMENSION AND DENJOY MAPS

DIOPHANTINE NUMBERS, DIMENSION AND DENJOY MAPS DIOPHANTINE NUMBERS, DIMENSION AND DENJOY MAPS BRYNA KRA AND JÖRG SCHMELING Abstract. We study the effect of the arithetic properties of the rotation nuber on the inial set of an aperiodic, orientation

More information

ERROR CORRECTING CODES

ERROR CORRECTING CODES ERROR CORRECTING CODES To send a message of 0 s and 1 s from my computer on Earth to Mr. Spock s computer on the planet Vulcan we use codes which include redundancy to correct errors. n q Definition. A

More information

THE POLYNOMIAL REPRESENTATION OF THE TYPE A n 1 RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n

THE POLYNOMIAL REPRESENTATION OF THE TYPE A n 1 RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n THE POLYNOMIAL REPRESENTATION OF THE TYPE A n RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n SHEELA DEVADAS AND YI SUN Abstract. We study the polynoial representation of the rational Cherednik algebra

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

Energy-Efficient Threshold Circuits Computing Mod Functions

Energy-Efficient Threshold Circuits Computing Mod Functions Energy-Efficient Threshold Circuits Coputing Mod Functions Akira Suzuki Kei Uchizawa Xiao Zhou Graduate School of Inforation Sciences, Tohoku University Araaki-aza Aoba 6-6-05, Aoba-ku, Sendai, 980-8579,

More information

New upper bound for the B-spline basis condition number II. K. Scherer. Institut fur Angewandte Mathematik, Universitat Bonn, Bonn, Germany.

New upper bound for the B-spline basis condition number II. K. Scherer. Institut fur Angewandte Mathematik, Universitat Bonn, Bonn, Germany. New upper bound for the B-spline basis condition nuber II. A proof of de Boor's 2 -conjecture K. Scherer Institut fur Angewandte Matheati, Universitat Bonn, 535 Bonn, Gerany and A. Yu. Shadrin Coputing

More information

Reed-Muller codes for random erasures and errors

Reed-Muller codes for random erasures and errors Reed-Muller codes for rando erasures and errors Eanuel Abbe Air Shpilka Avi Wigderson Abstract This paper studies the paraeters for which Reed-Muller (RM) codes over GF (2) can correct rando erasures and

More information

Necessity of low effective dimension

Necessity of low effective dimension Necessity of low effective diension Art B. Owen Stanford University October 2002, Orig: July 2002 Abstract Practitioners have long noticed that quasi-monte Carlo ethods work very well on functions that

More information

CHARACTER SUMS AND RAMSEY PROPERTIES OF GENERALIZED PALEY GRAPHS. Nicholas Wage Appleton East High School, Appleton, WI 54915, USA.

CHARACTER SUMS AND RAMSEY PROPERTIES OF GENERALIZED PALEY GRAPHS. Nicholas Wage Appleton East High School, Appleton, WI 54915, USA. INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 6 006, #A18 CHARACTER SUMS AND RAMSEY PROPERTIES OF GENERALIZED PALEY GRAPHS Nicholas Wage Appleton East High School, Appleton, WI 54915, USA

More information

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI

More information

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1.

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1. M ath. Res. Lett. 15 (2008), no. 2, 375 388 c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS Van H. Vu Abstract. Let F q be a finite field of order q and P be a polynoial in F q[x

More information

On Dillon s class H of Niho bent functions and o-polynomials

On Dillon s class H of Niho bent functions and o-polynomials On Dillon s class H of Niho bent functions and o-polynoials Claude Carlet and Sihe Mesnager LAGA, UMR 7539, CNRS, Departent of Matheatics, University of Paris XIII and University of Paris VIII, 2 rue de

More information

The degree of a typical vertex in generalized random intersection graph models

The degree of a typical vertex in generalized random intersection graph models Discrete Matheatics 306 006 15 165 www.elsevier.co/locate/disc The degree of a typical vertex in generalized rando intersection graph odels Jerzy Jaworski a, Michał Karoński a, Dudley Stark b a Departent

More information

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion Suppleentary Material for Fast and Provable Algoriths for Spectrally Sparse Signal Reconstruction via Low-Ran Hanel Matrix Copletion Jian-Feng Cai Tianing Wang Ke Wei March 1, 017 Abstract We establish

More information

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product. Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.

More information

A Quantum Observable for the Graph Isomorphism Problem

A Quantum Observable for the Graph Isomorphism Problem A Quantu Observable for the Graph Isoorphis Proble Mark Ettinger Los Alaos National Laboratory Peter Høyer BRICS Abstract Suppose we are given two graphs on n vertices. We define an observable in the Hilbert

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Note on generating all subsets of a finite set with disjoint unions

Note on generating all subsets of a finite set with disjoint unions Note on generating all subsets of a finite set with disjoint unions David Ellis e-ail: dce27@ca.ac.uk Subitted: Dec 2, 2008; Accepted: May 12, 2009; Published: May 20, 2009 Matheatics Subject Classification:

More information

Computable Shell Decomposition Bounds

Computable Shell Decomposition Bounds Journal of Machine Learning Research 5 (2004) 529-547 Subitted 1/03; Revised 8/03; Published 5/04 Coputable Shell Decoposition Bounds John Langford David McAllester Toyota Technology Institute at Chicago

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

ON SOME PROBLEMS OF GYARMATI AND SÁRKÖZY. Le Anh Vinh Mathematics Department, Harvard University, Cambridge, Massachusetts

ON SOME PROBLEMS OF GYARMATI AND SÁRKÖZY. Le Anh Vinh Mathematics Department, Harvard University, Cambridge, Massachusetts #A42 INTEGERS 12 (2012) ON SOME PROLEMS OF GYARMATI AND SÁRKÖZY Le Anh Vinh Matheatics Departent, Harvard University, Cabridge, Massachusetts vinh@ath.harvard.edu Received: 12/3/08, Revised: 5/22/11, Accepted:

More information

Support recovery in compressed sensing: An estimation theoretic approach

Support recovery in compressed sensing: An estimation theoretic approach Support recovery in copressed sensing: An estiation theoretic approach Ain Karbasi, Ali Horati, Soheil Mohajer, Martin Vetterli School of Coputer and Counication Sciences École Polytechnique Fédérale de

More information

Supplement to: Subsampling Methods for Persistent Homology

Supplement to: Subsampling Methods for Persistent Homology Suppleent to: Subsapling Methods for Persistent Hoology A. Technical results In this section, we present soe technical results that will be used to prove the ain theores. First, we expand the notation

More information

arxiv:math/ v1 [math.nt] 15 Jul 2003

arxiv:math/ v1 [math.nt] 15 Jul 2003 arxiv:ath/0307203v [ath.nt] 5 Jul 2003 A quantitative version of the Roth-Ridout theore Toohiro Yaada, 606-8502, Faculty of Science, Kyoto University, Kitashirakawaoiwakecho, Sakyoku, Kyoto-City, Kyoto,

More information

Perturbation on Polynomials

Perturbation on Polynomials Perturbation on Polynoials Isaila Diouf 1, Babacar Diakhaté 1 & Abdoul O Watt 2 1 Départeent Maths-Infos, Université Cheikh Anta Diop, Dakar, Senegal Journal of Matheatics Research; Vol 5, No 3; 2013 ISSN

More information

NORMAL MATRIX POLYNOMIALS WITH NONSINGULAR LEADING COEFFICIENTS

NORMAL MATRIX POLYNOMIALS WITH NONSINGULAR LEADING COEFFICIENTS NORMAL MATRIX POLYNOMIALS WITH NONSINGULAR LEADING COEFFICIENTS NIKOLAOS PAPATHANASIOU AND PANAYIOTIS PSARRAKOS Abstract. In this paper, we introduce the notions of weakly noral and noral atrix polynoials,

More information

arxiv: v2 [math.nt] 5 Sep 2012

arxiv: v2 [math.nt] 5 Sep 2012 ON STRONGER CONJECTURES THAT IMPLY THE ERDŐS-MOSER CONJECTURE BERND C. KELLNER arxiv:1003.1646v2 [ath.nt] 5 Sep 2012 Abstract. The Erdős-Moser conjecture states that the Diophantine equation S k () = k,

More information

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel 1 Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel Rai Cohen, Graduate Student eber, IEEE, and Yuval Cassuto, Senior eber, IEEE arxiv:1510.05311v2 [cs.it] 24 ay 2016 Abstract In

More information

Computable Shell Decomposition Bounds

Computable Shell Decomposition Bounds Coputable Shell Decoposition Bounds John Langford TTI-Chicago jcl@cs.cu.edu David McAllester TTI-Chicago dac@autoreason.co Editor: Leslie Pack Kaelbling and David Cohn Abstract Haussler, Kearns, Seung

More information

Statistics and Probability Letters

Statistics and Probability Letters Statistics and Probability Letters 79 2009 223 233 Contents lists available at ScienceDirect Statistics and Probability Letters journal hoepage: www.elsevier.co/locate/stapro A CLT for a one-diensional

More information

LOCAL MINIMAL POLYNOMIALS OVER FINITE FIELDS

LOCAL MINIMAL POLYNOMIALS OVER FINITE FIELDS Maria T* Acosta-de-Orozeo Departent of Matheatics, Southwest Texas State University, San Marcos, TX 78666 Javier Goez-Calderon Departent of Matheatics, Penn State University, New Kensington Capus, New

More information

Optimal Jamming Over Additive Noise: Vector Source-Channel Case

Optimal Jamming Over Additive Noise: Vector Source-Channel Case Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

Numerically repeated support splitting and merging phenomena in a porous media equation with strong absorption. Kenji Tomoeda

Numerically repeated support splitting and merging phenomena in a porous media equation with strong absorption. Kenji Tomoeda Journal of Math-for-Industry, Vol. 3 (C-), pp. Nuerically repeated support splitting and erging phenoena in a porous edia equation with strong absorption To the eory of y friend Professor Nakaki. Kenji

More information

Exponential sums and the distribution of inversive congruential pseudorandom numbers with prime-power modulus

Exponential sums and the distribution of inversive congruential pseudorandom numbers with prime-power modulus ACTA ARITHMETICA XCII1 (2000) Exponential sus and the distribution of inversive congruential pseudorando nubers with prie-power odulus by Harald Niederreiter (Vienna) and Igor E Shparlinski (Sydney) 1

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

Closed-form evaluations of Fibonacci Lucas reciprocal sums with three factors

Closed-form evaluations of Fibonacci Lucas reciprocal sums with three factors Notes on Nuber Theory Discrete Matheatics Print ISSN 30-32 Online ISSN 2367-827 Vol. 23 207 No. 2 04 6 Closed-for evaluations of Fibonacci Lucas reciprocal sus with three factors Robert Frontczak Lesbank

More information

A Note on Online Scheduling for Jobs with Arbitrary Release Times

A Note on Online Scheduling for Jobs with Arbitrary Release Times A Note on Online Scheduling for Jobs with Arbitrary Release Ties Jihuan Ding, and Guochuan Zhang College of Operations Research and Manageent Science, Qufu Noral University, Rizhao 7686, China dingjihuan@hotail.co

More information

A new type of lower bound for the largest eigenvalue of a symmetric matrix

A new type of lower bound for the largest eigenvalue of a symmetric matrix Linear Algebra and its Applications 47 7 9 9 www.elsevier.co/locate/laa A new type of lower bound for the largest eigenvalue of a syetric atrix Piet Van Mieghe Delft University of Technology, P.O. Box

More information

MA304 Differential Geometry

MA304 Differential Geometry MA304 Differential Geoetry Hoework 4 solutions Spring 018 6% of the final ark 1. The paraeterised curve αt = t cosh t for t R is called the catenary. Find the curvature of αt. Solution. Fro hoework question

More information

ELG 5372 Error Control Coding. Lecture 12: Ideals in Rings and Algebraic Description of Cyclic Codes

ELG 5372 Error Control Coding. Lecture 12: Ideals in Rings and Algebraic Description of Cyclic Codes ELG 5372 Error Control Coding Lecture 12: Ideals in Rings and Algebraic Description of Cyclic Codes Quotient Ring Example + Quotient Ring Example Quotient Ring Recall the quotient ring R={,,, }, where

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Singularities of divisors on abelian varieties

Singularities of divisors on abelian varieties Singularities of divisors on abelian varieties Olivier Debarre March 20, 2006 This is joint work with Christopher Hacon. We work over the coplex nubers. Let D be an effective divisor on an abelian variety

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Least Squares Fitting of Data

Least Squares Fitting of Data Least Squares Fitting of Data David Eberly, Geoetric Tools, Redond WA 98052 https://www.geoetrictools.co/ This work is licensed under the Creative Coons Attribution 4.0 International License. To view a

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

UCSD Spring School lecture notes: Continuous-time quantum computing

UCSD Spring School lecture notes: Continuous-time quantum computing UCSD Spring School lecture notes: Continuous-tie quantu coputing David Gosset 1 Efficient siulation of quantu dynaics Quantu echanics is described atheatically using linear algebra, so at soe level is

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

Testing Properties of Collections of Distributions

Testing Properties of Collections of Distributions Testing Properties of Collections of Distributions Reut Levi Dana Ron Ronitt Rubinfeld April 9, 0 Abstract We propose a fraework for studying property testing of collections of distributions, where the

More information

Bounds on the Minimax Rate for Estimating a Prior over a VC Class from Independent Learning Tasks

Bounds on the Minimax Rate for Estimating a Prior over a VC Class from Independent Learning Tasks Bounds on the Miniax Rate for Estiating a Prior over a VC Class fro Independent Learning Tasks Liu Yang Steve Hanneke Jaie Carbonell Deceber 01 CMU-ML-1-11 School of Coputer Science Carnegie Mellon University

More information

New Classes of Positive Semi-Definite Hankel Tensors

New Classes of Positive Semi-Definite Hankel Tensors Miniax Theory and its Applications Volue 017, No., 1 xxx New Classes of Positive Sei-Definite Hankel Tensors Qun Wang Dept. of Applied Matheatics, The Hong Kong Polytechnic University, Hung Ho, Kowloon,

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

60 CAPTER 6. INTRODUCTION TO BINARY BLOCK CODES Under the 2-PAM ap, the set (F 2 ) n of all binary n-tuples aps to the set of all real n-tuples of the

60 CAPTER 6. INTRODUCTION TO BINARY BLOCK CODES Under the 2-PAM ap, the set (F 2 ) n of all binary n-tuples aps to the set of all real n-tuples of the Chapter 6 Introduction to binary block codes In this chapter we b e g i n to study binary signal constellations, which are the Euclidean-space iages of binary block codes. Such constellations have bit

More information

Bernoulli Numbers. Junior Number Theory Seminar University of Texas at Austin September 6th, 2005 Matilde N. Lalín. m 1 ( ) m + 1 k. B m.

Bernoulli Numbers. Junior Number Theory Seminar University of Texas at Austin September 6th, 2005 Matilde N. Lalín. m 1 ( ) m + 1 k. B m. Bernoulli Nubers Junior Nuber Theory Seinar University of Texas at Austin Septeber 6th, 5 Matilde N. Lalín I will ostly follow []. Definition and soe identities Definition 1 Bernoulli nubers are defined

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information