CONVOLUTIONAL CODES AND IRREDUCIBLE IDEALS

Size: px
Start display at page:

Download "CONVOLUTIONAL CODES AND IRREDUCIBLE IDEALS"

Transcription

1 R 78 Philips Res. Repts 27, 27-27, 72 CONVOLUTIONAL CODES AND IRREDUCIBLE IDEALS by Ph. PIRET Abstract.RS-like and BCH-like convolutional codes are constructed, which seem to have good free-distance properties. Some BCH-like codes are optimal for the Plotkin bound. The RS-like codes are extensible by pseudo random encoding to obtain long asymptotically good convolutional codes.. Introduction The construction of "good" block or convolutional codes is not an easy matter. Short BCH.2) or quadratic residue ) block codes are good enough and sometimes optimal. On the other hand, Justesen 26) recently constructed infinite families of block codes with a fixed rate kin, for which djn remains larger than a computable strictly positive number only depending on the chosen rate, when n grows to infinity. One of the steps in his construction uses the Reed-Solomon.8) codes. Two different points of view can be adopted to construct convolutional codes. One can try to obtain codes with an algebraically describable decoding algorithm.6.-2.). A different possibility is to search for codes with a large free distance, which are well suited for sequential decoding ). Except for the last, these constructions are algorithmic and the structure of the codes has no simple algebraic description. On the other hand, these codes only have one information symbol per word. The constructions we shall describe in this paper make use of block codes and of the bounds obtained for their minimum distance, and in this sense, they present some similarities with some other results 0-2.). However, these latter results are largely generalized and more systematically obtained. On the other hand, our main interest is in the free' distance d f. We shall obtain algebraically describable convolutional codes with a lower bound on d f by use of arguments developed by other authors ). These arguments are either algebraic, or based on a sequential procedure. We shall thus obtain RS-like and BCH-like convolutional codes. Our RS-like convolutional codes can be extended by the pseudo random encoding mode of Justesen to obtain families of convolutional codes of fixed rate and constraint length ', for which n grows to infinity while dflvn remains larger than a computable strictly positive number.

2 28 Ph. PIRET 2. A convenient representation for the convolutional codes Let q be a power of 2, and consider a linear convolutional code of length n, rate kin, and constraint length ")I, on GF(q). A generator matrix for this code can be represented as where all G) are (k,n) matrices, with elements in GF(q). A generator matrix can also be represented as () v -e L (2) and the use of both representations is well known. We now suppose that the block codes generated by all G) are cyclic. Since a cyclic code of length nis the direct sum of its irreducible ideals in the algebra of polynomials modulo (xn_ ), we can represent each G l as follows: Gl.) G2,) G)= () Gm,) where all GIJ are generator matrices of different irreducible cyclic codes. Consider now 0:, a primitive nth root of unity; 0: is in GF(q) or in some of its proper extensions. We denote by m,(x) the minimal polynomial of 0:' with coefficients in GF(q). It is a factor of (xn_ ), and a code defined by any GIJ can also be seen as the irreducible ideal in the algebra of polynomials modulo (xn_ ), generated by xn_ gr(x) = mr(x) (4) for some convenient r. Since m,(x) is the minimal polynomial not only of 0:', but also of all 0: with i = rs' modulo n, for s =,2,..., the index r is univocally fixed by choosing the smallest of these i after reduction modulo n.. In the following, we shall denote all the Gij only by the index r of the corresponding m,(x). Moreover, all Gij with a fixed i will correspond to irreducible ideals of the same dimension. With these conventions the generator matrix () now becomes a rectangular array of integers. This representation is well adopted for our purpose. An

3 CONVOLUTIONAL CODES AND IRREDUCIBLE IDEALS 2 example is now given. Consider a code of length on GF(2); ()(is a root of XS + X 2 +, and the other ml(x) can be found in the book of Peterso? 4): m (X) =Xs +X2 +, m(x) = XS + X4 + X + X2 +, ms(x) = XS + X4 + X 2 + X +, m7(x) = XS + X + X 2 + X +, m ll (X)=XS+X4+X +X+, m S (X) = Xs + X +, mo(x) = X +. () A (, 0) convolutional code with = can have the following matrix G: G = [ J 7 ' (6) In this matrix each number r refers to a generator matrix of a (, ) cyclic code, whose generator matrix is (X _ l)fm r (X). From any matrix G we obtain easily a semi-infinite matrix r such that all sequences of the code are in the "row space" of r. For the above example we obtain 7 ~ 7 r= (7) 7 7. A sequence of the code can thus be partially characterized by a set of rows of I', referring to the non-zero components of its information symbols.. An easy way to check the non-catastrophic character of a generator matrix It is well known that a code exhibits catastrophic error propagation, if and only if there is an information sequence of infinite weight that gives a fini teweight encoded sequence 4.20). We now investigate the structure of such a finite weight, infinite sequence for the codes defined in sec. 2.

4 260 Ph. PlRET Any vector expressed in the basis of the irreducible ideals can be zero if and only if all its components are zero, so that any number of G that appears an infinite number of times in a catastrophic sequence, must appear strictly more than once in each column where it appears, and this at least after some wth column, where w is finite. If there is no finite w for which this is verified, the weight of the sequence is necessarily infinite. Let now y be the set of rows of G that can appear an infinite number of times in a catastrophic sequence. We first suppose that all rows of G are in y. Since each number that appears in these rows must appear at least twice in y, we can subtract from y all rows containing numbers that appear only once in G. The same process can be iterated until all elements of the remaining rows appear at least twice in the set of these rows. If y does not become empty the problem remains open. But if y becomes the empty set, the code surely presents no catastrophic error propagation. As an example we consider a code of length 7 on GF(2 ). All mr(x) have degree. This code has the following generator matrix: 2 G= o The elements and 0 appear only once in this matrix, so that in a first step y ~n is reduced to [! Now, 2 and 6 appear once, and y is reduced to [ 4]. This last row can also be deleted since all its components appear once. The set y becomes empty and the code is surely not catastrophic. 4. The low-rate RS-Iike convolutional codes 4.. Primitive convolutional codes We now apply the concepts of sec. 2 to the case where a is a primitive element of GF(q), (q = 2"', n = 2'" - ). All m,(x) have degree, and the generators for the irreducible ideals are XZm-l_ gr(x) = X r ' r = 0,,..., 2"'- 2. -a All matrices Gij thus have one row and (2'" - ) columns and will be repre-.sented by the corresponding r (8) () /

5 CONVOLUTIONAL CODES AND IRREDUCIBLE IDEALS 26 Let us consider the low-rate RS-like convolutional code of length (2'" - ) on GF(2"') defined by the following matrix G: G= o k j j ~I (,-) kl k + I. : ('-r+ IJ' (0) k-l 2k-l (j+l)k-l vk-l where v k is at most 2"'. For v k = 2 m, we have v k- = 0, since We now investigate the free distance of the code defined by G. Theorem 4.. The code defined by (0) is not catastrophic and has a free distance d f satisfying d f ~ v (2 m _ Proof It is first easily proved by use of sec. that this code is not catastrophic. Only finite sequences must thus be considered to determine the free distance- Consider now an information sequence of length u, i.e. a sequence of informa. tion k-tuples that is identically zero before the first and after the uth of these. The first and the uth information k-tuples are not zero. We first suppose that ~ u~ v-. For all i ~ u-, the ith word in the encoded sequence is a nonzero word of a cyclic code whose generators are the gr(x) with 0 ~ r ~ i k- Its minimal weight 6) is thus at least (2 m - ik). Similarly, the (u + v- i)th word is generated by the gr(x), with (v- i)k ~ r ~ vk-, so that its weight is also at least (2'"- ik) 6) and the intermediate words from the uth to the vth have a weight ~ (2'"- u k). The minimal weight of this sequence is thus lower-bounded by u-i 2 l: (2'"_ ik) + (v- u + )(2 m _ uk) = (v- ) 2'" + u (2'"_ v k). () = In the range of u and v considered, this expression is minimal for u =, where its value is v (2 m - k). We now suppose that u ~ v. As in the first case, both the weights of the ith and of the (u+ v- i)th word, ( ~ i ~ v- ), are at least (2'"- i k), so that the total weight of the sequence is at least k). v-i 2l: (2 m _ ik) = 2 (v- )2 m - v (v- )k. = (2)

6 262 Ph. PIRET It is then easily checked that this last expression is greater than or equal to v (2 m - k), or equivalently that for all positive integers v, from 2 to 2'"jk. Q.E.D Non-primitive convolutional codes (v - 2) 2 m - v (v - 2) k ~ 0 () The above construction is easily extended to all odd lengths n. Let a be a primitive nth root of unity and GF(2 ) be the smallest field that contains a. The numbers r, of a generator matrix, now refer to the irreducible ideals generated by the polynomials gr(x), defined on the field GF(2 m ), as follows: xn-l gr(x) = ---, r = 0,,..., n -. X - ar \ The code is now also defined by the matrix G, (eq. (0)), where v k is at most n +. If v k = n + I, v k - is zero since an = (l0 =. Theorem.2. The code we just defined is not catastrophic and has a free distance that is at least v (n + - k). Proof It follows from straightforward generalizations of the preceding one, and it will be omitted. As an example, consider a code of length 2 on GF(2048) generated by a, a primitive 2th root of unity. Such a code with 6 information symbols per word, and v = 4, can be specified by the following matrix: G= Its free distance is at least 4. ( ) = Other distance properties of the RS-like convolutional codes Besides the free distance d f and the minimum distance d mn, the following distances can be defined for a convolutional code 2): ' (a) dei) is the column distance of order i. It is an increasing function defined as being the minimal weight of all sequences of the code, beginning by a non-zero word and limited to their (i + ) first words. In particular, d (v - ) is the minimum distance of the code. All dei) are upper-bounded by d f (4)

7 CONVOLUTIONAL CODES AND IRREDUCIBLE IDEALS 26 (b) rei) is the row distance of order i.lt is a decreasing function defined as being the minimal weight of the code sequences beginning with a non-zero word, and corresponding to information sequences that are zero after their (i + I)th k-tuple. All rei) are lower-bounded by df. The preceding paragraphs lead us to the following remarks. (RI) The lower bound obtained for rei) is already df for reo); r(i) thus seems to be a weakly decreasing function for the RS-like convolutional codes. (R2) Denoting by dei) a lower bound on dei), obtained as in the proof of theorem 4., we may write d(i) ~ d(i- )+ (n + )- (i + )k. lt is thus a fairly increasing function. In particular, one has () 2 (n + ) - k (v + ) d(v- ) ~ v. 2 (6) Both remarks suggest that the RS-like convolutional codes are "good" codes.. High-rate R,S-like convolutional codes The codes defined in sec. 4 are low-rate codes whose free distance is Iower- bounded by df~v(n-k+ I). (7) These constructions give codes with k v-i ~ n and are not applicable to rates greater than t. Consider now a code defined by ex,a primitive nth root of unity, that has the following generator matrix: o G= 2 2 (8) k-l k If k ~ n-, it is easy to check that this code is not catastrophic and has a free distance lower-bounded by (7) for v = 2. Consider now a code with v = and k ~ n- I, defined by G= 0 L () k-i k\ k-i

8 264 Ph. PIRET This code is clearly non-catastrophic, and it is not difficult to see that each finite encoded sequence of the code contains at least three non-zero words. If k ;;;::: 2, it is easily shown that (7) remains valuable. The complete proof is left to the reader. ; 6. Free distance of binary convolutional codes The free distance of the binary convolutional codes as defined in sec, can be computed with the aid of two different arguments. The first is algebraic and uses known bounds on the minimum distance of block codes. The second is sequential and applies ideas of Forney 2), to a stack-like algorithm similar to that of Jelinek 8) and Zigangirov 7). 6.. Algebraic arguments These are more easily described with the aid of an example. Consider the (, 0) code whose matrix G was given hereabove (6). We shall first examine the structure of the cyclic block codes of length, and construct therefore table I as follows. We choose an exthat is a primitive th root of unity, and from this exwe construct the corresponding set of polynomials mr(x) as in sec. 2. We then range the irredundant set of indices r, except 0, in increasing order. This is the first row of table I: (,,, 7,, ), where each r represents the class of the numbers r 2' modulo, for s =, 2,, 4,. Consider now ex a different primitive th root of unity, chosen on such a way that, the exponent of ex,is not in the class of.the substitution ex-+ ex results in a permutation of the r in the first row of table I, i.e. the polynomial mi (X) corresponding to ex is in fact the polynomial m(x) corresponding to ex.similarly m~(x) corresponding to ex is ms(x) corresponding to ex,and so on. The second row of table I will contain the permutation of the indices r, induced by the substitution ex-+ ex In the same way the four last rows will contain the permutations induced by the substitutions ex-+ ex r for r =, 7,,. In general, all rows corresponding to indices r that are not relatively prime with n must be deleted, and the table is square only if n is a prime. TABLE I

9 CONVOLUTIONAL CODES AND IRREDUCIBLE IDEALS 26 The theory of the BCH codes shows us that a word generated by some given set of g,(x), each with a non-zero coefficient, has a minimum weight that can be lower-bounded as follows. Suppose first that all r are different. We then first search the row in the above table where the set of these indices rappears the mos.-to the right. Suppose that in this row no considered index appears in the (w - ) first columns. The minimum weight of the word is lower-bounded byadding to the leader of the wth column. For example, a word of length, generated by gl(x) and gl(x) is characterized by the set (, ). This set appears in the last columns of the rd row of table. The minimum weight of the word is thus at least 8. Suppose now that the set of r contains multiple indices. Two cases are then possible. If all the indices appear at least twice in the set, the obtained minimum weight is zero, i.e. the set of gr(x) can generate the zero word with non-zero coefficients. If at least one index appears only once, we may then neglect the multiplicity of the indices and compute the weight of this word using the way described above. Sometimes the BCH bound is below the real minimal weight of a code, as for some quadratic residue codes. When a better bound than the BCH one is known, it can naturally be used in the evaluation of the minimal weight of a word. Tables ILl and IL2 are BCH tables, similar to table I, for other lengths Sequential use of classical bounds Using classical bounds on the minimal weight of each word of a sequence as described in sec. 6., we obtain a lower bound on the free distance of a code, in a way to be now described. Some particular tricks can often be applied if ')I is small, but we now present a general algorithm based on the transfor- n=7 D n n = G ~J n = cf. sec. 6. TABLE ILl n =

10 TABLE IL2 N 0\ 0\ ; n = ; ' ~ S

11 CONVOLUTIONAL CODES AND IRREDUCIBLE IDEÀLS 267 mation 2) of the stack algorithm 7.8). This algorithm is illustrated by the code defined by (6), whose G is rewritten G = [ 7 ~] and whose r is given above (eq. (7». From these matrices we construct two trees (fig. I), which have at each level four new branches for each branch in the preceding level. Each level represents a word and the first level has only the last branches. In the first tree these are indexed, and -, and correspond to the case where the first word is a multiple of gs(x) or of gl(x) or only of their greatest common divisor. The first branch of the other levels corresponds to the case where the infor- _ mation symbols of the corresponding word are zero. Near this first semi-infinite tree, we now construct step by step a similar tree whose branches are indexed by the minimal weight of the corresponding sequences as follows. The three possibilities for the first word correspond to minimal weights that are respectively 6, 6 and 2, as is obtained from sec. 6.. These weights I Fig.. Trees for the computation I 2 r 20 8 of df'

12 268 Ph. PIRET are indicated on the first level of the 2nd tree. The least of these weights is 2 and the corresponding branch must be extended. The interesting submatrix of ris [ ~J ' and the four possibilities for the 2nd word are "weighted" following sec. 6. to obtain as partial weights 2, 6, 8 and 6 and as total weights 24, 8, 20 and 8. The minimal weight of the not-extended branches is now 6 and the corresponding branches are extended. This procedure is continued until a node of minimal weight has an infinite number of successors with the same weight. This weight is a lower bound on the free distance of the code. For the above example, the free distance finally obtained is 6. However, in this particular case, since the first and the last word in any sequence have at least a weight of 2, it is sufficient to show that the total weight of any intermediate subsequence is also at least 2, and this can be achieved by moredirect arguments. 6.. Binary convolutional codes We give here some examples of binary convolutional codes with the obtained lower bound on their free distance. (a) The first codes below can be seen as an extension of the maximal-length sequence block codes n k ')I G d f 2 [, ] ~8 * 2 [, 7] ~ 6 * 4 [,,, ] ~ 64 * [,,,, ] ~76 6 [,,,,, 7] ~84 4 [,,,] ~ 28 * [,,,,2] ~ 4 6 [,,,,2, ] ~ 68 All codes indexed by * meet the Plotkin bound obtained by Layland and McEliece ). (b) The quadratic residue codes are well suited to define good codes with ')=2.

13 CONVOLUTIONAL CODES AND IRREDUCIBLE IDEALS 26 n k G [,] [, ] [,] [, ] d f ~ 2 ~ ~ ~20 A more complete table can be constructed from the one given by Berlekamp ) for QR block codes. (c) General BCH-like convolutional codes are easily constructed and not too difficult to be checked for their d f as explained in secs 6. and 6.2, where a first example was used. We give here some other examples: ~24 n k 'V G 7 7 [; : I~J [:! I: I:J [ J 27 ~ 66 In one of these matrices there appear indexed numbers such as 7a> Sa>Sb. The meaning of these indices refers to the actual generator matrices of the corre- ~24

14 270 Ph. PlRET sponding irreducible codes. For example, 7a denotes the same generator matrix, both times it appears; a and b denote two different generator matrices such that the substitution a -- b leaves no vector of the code invariant except zero. The non-indexed numbers denote arbitrary generator matrices. 7. The construction of asymptotically good convolutional codes The pseudo random encoding used by Justesen 26), is also applicable to the RS-like convolutional codes whose length is (2"'/_ I) (cf. secs 4 and ). We shall only illustrate this by an example. The general discussion about rates, puncturing and optimalization, seems to be only a generalization of Justesen's work based on the above material, and will not be given here. We consider a. primitive RS-like convolutional code on GF(2"') with k = 2 and v ~ 2",-. The jth symbol of each word of this code is then encoded by the jth code in the Wozencraft's ensemble of the pseudo randomly shifted (2m, m), binary codes. We now lower-bound df> the free distance ofthe resulting binary convolutional code. Theorem 7.. When m grows to infinity, the free distance of the binary convolutional code constructed hereabove is lower-bounded by In (20), H-l(X) denotes the inverse of the binary entropy function, univocally specified by 0 ~ H-l(X) ~ t, and nb is 2 m (2"'- ), i.e. the length of a word of the binary convolutional code. Proof Justesen has proved that the linear binary block code obtained by the pseudo random encoding ofan RS block code on GF(2"'), oflength n = 2'"_ I, and rate kin, has a minimal weight that is lower-bounded by nb[h-l(t) - O(m)] (- k/n). As in the proof of theorem 4., we now consider an information sequence of u words that is encoded in Cu + 'ji- ) words. Suppose first that ~ u ~ 'ji-. For all i ~ u-i, the ith and the (u + 'ji- i)th word of the RS-like code are words of an RS block code whose rate is i 2 /(2"' - ). The binary words obtained thus have a weight that is lower-bounded by (20) In the same 'way the ('jiis lower-bounded by u + ) intermediate words have each a weight that nb[h-l(t) - OCm)] [- u 2"/(2"'- )]. The total weight of the sequence is thus lower-bounded by summing the contributions of all these words, to obtain the following expression:

15 CONVOLUTIONAL CODES AND IRREDUCIBLE IDEALS 27 nb[h- (t)- O(m)] {v- + u [- v2 S /(2"'- I)]}. / (2) A similar expression can also be obtained if u ~ v, as in theorem 4.. It is then easily seen that the expression (2) has the form claimed by (20). Q.E.D. If we denote by h(v) the expression (v- ) H- (t), which does not depend on nb' we obtain for the code we just constructed: lim (df/nb) ~ h(v). m-+oo (22) 8. Conclusion In the preceding sections we tried to generalize some classical results on cyclic block codes to obtain constructive families of convolutional codes of sufficient quality. There seem however to remain many open questions in this area, and particularly in the construction of high-rate RS-like codes and of binary BCHlike codes. MBLE Research Laboratory Brussels, May 72 REFERENCES ) R. C. Bose and D. K. Ra y-ch au dh u r y, Information and Control, 68-7, 60. 2) R. C. Bose and D. K. Ra y-ch a udh u ry, Information and Control,27-20, 60. ). S. Reed and G. Solomon, J. Soc. indo appl. Math. 8, 00-04, 60. 4) W. W. Peterson, Error correcting codes, The M.LT. Press, Cambridge, Mass., 6. ) J. L. Massey, Threshold decoding, The M.I.T. Press, Cambridge, Mass., 6. 6) A. D. Wyner and R. B. Ash, IEEE Trans. Inform. Theory IT-, 4-6, 6. 7) K. S. Zigangirov, Problemy Peredachi Informatsii 2, no. 4, -2, 66. 8) G. D. Forney, Concatenated codes, The M.I.T. Press, Cambridge, Mass., 66. ) J. P. Ro binson and A. J. Bernstein, IEEE Trans. Inform. Theory IT-, 06-, 67. 0) S. M. Reddy and J. P. Robinson, Information and Controll2, -70, 68. ) S. M. Reddy, Information and Control, 7-62, 68. _ 2) S. M. Reddy and J. P. Robinson, Information and Control, 42-07, 68. ) E. R. Berlekamp, Algebraic coding theory, McGraw-Hill Book Company, 68. 4) L. J. Massey and M. K. Sain, IEEE Trans. Comp. C-7, 0-7, 68. ) P. M. Ebert and S. Y. Tong, Bell Sys. tech. J. 48, , 6. 6) J. M. Goethals, Codes linéaires définispar des polynornes, Thesis, Université Catholique de Louvain, September 6. 7) D. J. Costello, IEEE Trans. Inform. Theory IT-S, 6-66, 6. 8) F. Jelinek, J.B.M. J. Res. Dev., 67-68, 6. ) J. Layl an d and R. MeElieee, An upper bound on free distance of a tree code, Jet Propulsion Laborat. Calif. Institute Techn. Pasadena, Space Program Summary 7-62, vol., Apr. 70, pp ) G. D. Forney, IEEE Trans. Inform. Theory IT-6, , 70. 2) C. D. Forney, IEEE Trans. Inform. Theory IT-6, 7-7, ) L. J. Massey and D. J. Costello, IEEE Trans. Comrn. Techno!. COM", 806-8, 7. 2) L. R. Bahl and F. Jelinek, IEEE Trans. Inform. Theory IT-7, , 7. 24) J. L. Massey, D. J. Costello and J. Justesen, Polynomials weights and code construction, to be published in IEEE Trans. Inform. Theory. 2) J. L. Massey, Lectures on convolutional codes, given at the Catholic University Leuven, ' January ) J. Justesen, Constructive, asymptotically good, algebraic codes, IEEE Intern. Symposium on Information Theory, Asilomar (Cal.), January 72.

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

Binary Convolutional Codes of High Rate Øyvind Ytrehus

Binary Convolutional Codes of High Rate Øyvind Ytrehus Binary Convolutional Codes of High Rate Øyvind Ytrehus Abstract The function N(r; ; d free ), defined as the maximum n such that there exists a binary convolutional code of block length n, dimension n

More information

5.0 BCH and Reed-Solomon Codes 5.1 Introduction

5.0 BCH and Reed-Solomon Codes 5.1 Introduction 5.0 BCH and Reed-Solomon Codes 5.1 Introduction A. Hocquenghem (1959), Codes correcteur d erreurs; Bose and Ray-Chaudhuri (1960), Error Correcting Binary Group Codes; First general family of algebraic

More information

Chapter10 Convolutional Codes. Dr. Chih-Peng Li ( 李 )

Chapter10 Convolutional Codes. Dr. Chih-Peng Li ( 李 ) Chapter Convolutional Codes Dr. Chih-Peng Li ( 李 ) Table of Contents. Encoding of Convolutional Codes. tructural Properties of Convolutional Codes. Distance Properties of Convolutional Codes Convolutional

More information

SPHERE PACKINGS CONSTRUCTED FROM BCH AND JUSTESEN CODES

SPHERE PACKINGS CONSTRUCTED FROM BCH AND JUSTESEN CODES SPHERE PACKINGS CONSTRUCTED FROM BCH AND JUSTESEN CODES N. J. A. SLOANE Abstract. Bose-Chaudhuri-Hocquenghem and Justesen codes are used to pack equa spheres in M-dimensional Euclidean space with density

More information

New algebraic decoding method for the (41, 21,9) quadratic residue code

New algebraic decoding method for the (41, 21,9) quadratic residue code New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,

More information

Chapter 7 Reed Solomon Codes and Binary Transmission

Chapter 7 Reed Solomon Codes and Binary Transmission Chapter 7 Reed Solomon Codes and Binary Transmission 7.1 Introduction Reed Solomon codes named after Reed and Solomon [9] following their publication in 1960 have been used together with hard decision

More information

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Shu Lin, Shumei Song, Lan Lan, Lingqi Zeng and Ying Y Tai Department of Electrical & Computer Engineering University of California,

More information

Error Correction Methods

Error Correction Methods Technologies and Services on igital Broadcasting (7) Error Correction Methods "Technologies and Services of igital Broadcasting" (in Japanese, ISBN4-339-06-) is published by CORONA publishing co., Ltd.

More information

IN this paper, we will introduce a new class of codes,

IN this paper, we will introduce a new class of codes, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 44, NO 5, SEPTEMBER 1998 1861 Subspace Subcodes of Reed Solomon Codes Masayuki Hattori, Member, IEEE, Robert J McEliece, Fellow, IEEE, and Gustave Solomon,

More information

Information Theory. Lecture 7

Information Theory. Lecture 7 Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible

More information

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM)

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM) International Journal of Computational Intelligence Research (IJCIR). ISSN: 097-87 Volume, Number 8 (207), pp. 205 2027 Research India Publications http://www.ripublication.com/ijcir.htm New Algebraic

More information

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols

More information

ECEN 5022 Cryptography

ECEN 5022 Cryptography Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,

More information

PAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES

PAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES International Journal of Pure and Applied Mathematics Volume 85 No. 6 013, 1001-1008 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/10.173/ijpam.v85i6.3

More information

UNIT MEMORY CONVOLUTIONAL CODES WITH MAXIMUM DISTANCE

UNIT MEMORY CONVOLUTIONAL CODES WITH MAXIMUM DISTANCE UNIT MEMORY CONVOLUTIONAL CODES WITH MAXIMUM DISTANCE ROXANA SMARANDACHE Abstract. Unit memory codes and in particular, partial unit memory codes are reviewed. Conditions for the optimality of partial

More information

Code design: Computer search

Code design: Computer search Code design: Computer search Low rate codes Represent the code by its generator matrix Find one representative for each equivalence class of codes Permutation equivalences? Do NOT try several generator

More information

Example of Convolutional Codec

Example of Convolutional Codec Example of Convolutional Codec Convolutional Code tructure K k bits k k k n- n Output Convolutional codes Convoltuional Code k = number of bits shifted into the encoder at one time k= is usually used!!

More information

Constructions of MDS-Convolutional Codes

Constructions of MDS-Convolutional Codes IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 5, JULY 2001 2045 Constructions of MDS-Convolutional Codes Roxana Smarandache, Student Member, IEEE, Heide Gluesing-Luerssen, and Joachim Rosenthal,

More information

Constructions of Quadratic Bent Functions in Polynomial Forms

Constructions of Quadratic Bent Functions in Polynomial Forms 1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence

More information

Binary Convolutional Codes

Binary Convolutional Codes Binary Convolutional Codes A convolutional code has memory over a short block length. This memory results in encoded output symbols that depend not only on the present input, but also on past inputs. An

More information

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction BCH Codes Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Preface The

More information

Reed-Solomon codes. Chapter Linear codes over finite fields

Reed-Solomon codes. Chapter Linear codes over finite fields Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime

More information

RON M. ROTH * GADIEL SEROUSSI **

RON M. ROTH * GADIEL SEROUSSI ** ENCODING AND DECODING OF BCH CODES USING LIGHT AND SHORT CODEWORDS RON M. ROTH * AND GADIEL SEROUSSI ** ABSTRACT It is shown that every q-ary primitive BCH code of designed distance δ and sufficiently

More information

Berlekamp-Massey decoding of RS code

Berlekamp-Massey decoding of RS code IERG60 Coding for Distributed Storage Systems Lecture - 05//06 Berlekamp-Massey decoding of RS code Lecturer: Kenneth Shum Scribe: Bowen Zhang Berlekamp-Massey algorithm We recall some notations from lecture

More information

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Antonio Aparecido de Andrade Department of Mathematics, IBILCE, UNESP, 15054-000, São José do Rio Preto, SP, Brazil E-mail:

More information

MATH 326: RINGS AND MODULES STEFAN GILLE

MATH 326: RINGS AND MODULES STEFAN GILLE MATH 326: RINGS AND MODULES STEFAN GILLE 1 2 STEFAN GILLE 1. Rings We recall first the definition of a group. 1.1. Definition. Let G be a non empty set. The set G is called a group if there is a map called

More information

4F5: Advanced Communications and Coding

4F5: Advanced Communications and Coding 4F5: Advanced Communications and Coding Coding Handout 4: Reed Solomon Codes Jossy Sayir Signal Processing and Communications Lab Department of Engineering University of Cambridge jossy.sayir@eng.cam.ac.uk

More information

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013 Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved

More information

Structured Low-Density Parity-Check Codes: Algebraic Constructions

Structured Low-Density Parity-Check Codes: Algebraic Constructions Structured Low-Density Parity-Check Codes: Algebraic Constructions Shu Lin Department of Electrical and Computer Engineering University of California, Davis Davis, California 95616 Email:shulin@ece.ucdavis.edu

More information

Chapter 6 Lagrange Codes

Chapter 6 Lagrange Codes Chapter 6 Lagrange Codes 6. Introduction Joseph Louis Lagrange was a famous eighteenth century Italian mathematician [] credited with minimum degree polynomial interpolation amongst his many other achievements.

More information

ON VALUES OF CYCLOTOMIC POLYNOMIALS. V

ON VALUES OF CYCLOTOMIC POLYNOMIALS. V Math. J. Okayama Univ. 45 (2003), 29 36 ON VALUES OF CYCLOTOMIC POLYNOMIALS. V Dedicated to emeritus professor Kazuo Kishimoto on his seventieth birthday Kaoru MOTOSE In this paper, using properties of

More information

PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes

PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes 359 PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes Ching-Lung CHR a),szu-linsu, Members, and Shao-Wei WU, Nonmember SUMMARY A low-complexity step-by-step decoding algorithm

More information

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson

Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC. August 2011 Ravi Motwani, Zion Kwok, Scott Nelson Low Density Parity Check (LDPC) Codes and the Need for Stronger ECC August 2011 Ravi Motwani, Zion Kwok, Scott Nelson Agenda NAND ECC History Soft Information What is soft information How do we obtain

More information

Algebra for error control codes

Algebra for error control codes Algebra for error control codes EE 387, Notes 5, Handout #7 EE 387 concentrates on block codes that are linear: Codewords components are linear combinations of message symbols. g 11 g 12 g 1n g 21 g 22

More information

Plotkin s Bound in Codes Equipped with the Euclidean Weight Function

Plotkin s Bound in Codes Equipped with the Euclidean Weight Function Tamsui Oxford Journal of Mathematical Sciences 5() (009) 07-4 Aletheia University Plotkin s Bound in Codes Equipped with the Euclidean Weight Function Sapna Jain Department of Mathematics, University of

More information

EE512: Error Control Coding

EE512: Error Control Coding EE51: Error Control Coding Solution for Assignment on BCH and RS Codes March, 007 1. To determine the dimension and generator polynomial of all narrow sense binary BCH codes of length n = 31, we have to

More information

Low-complexity error correction in LDPC codes with constituent RS codes 1

Low-complexity error correction in LDPC codes with constituent RS codes 1 Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 348-353 Low-complexity error correction in LDPC codes with constituent RS codes 1

More information

Chapter 6. BCH Codes

Chapter 6. BCH Codes Chapter 6 BCH Codes Description of the Codes Decoding of the BCH Codes Outline Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Weight

More information

1 Vandermonde matrices

1 Vandermonde matrices ECE 771 Lecture 6 BCH and RS codes: Designer cyclic codes Objective: We will begin with a result from linear algebra regarding Vandermonde matrices This result is used to prove the BCH distance properties,

More information

Introduction to finite fields

Introduction to finite fields Chapter 7 Introduction to finite fields This chapter provides an introduction to several kinds of abstract algebraic structures, particularly groups, fields, and polynomials. Our primary interest is in

More information

Proof: Let the check matrix be

Proof: Let the check matrix be Review/Outline Recall: Looking for good codes High info rate vs. high min distance Want simple description, too Linear, even cyclic, plausible Gilbert-Varshamov bound for linear codes Check matrix criterion

More information

TWO VARIATIONS OF A THEOREM OF KRONECKER

TWO VARIATIONS OF A THEOREM OF KRONECKER TWO VARIATIONS OF A THEOREM OF KRONECKER ARTŪRAS DUBICKAS AND CHRIS SMYTH ABSTRACT. We present two variations of Kronecker s classical result that every nonzero algebraic integer that lies with its conjugates

More information

Which Codes Have 4-Cycle-Free Tanner Graphs?

Which Codes Have 4-Cycle-Free Tanner Graphs? Which Codes Have 4-Cycle-Free Tanner Graphs? Thomas R. Halford Communication Sciences Institute University of Southern California Los Angeles, CA 90089-565 USA Alex J. Grant Institute for Telecommunications

More information

Decoding linear codes via systems solving: complexity issues and generalized Newton identities

Decoding linear codes via systems solving: complexity issues and generalized Newton identities Decoding linear codes via systems solving: complexity issues and generalized Newton identities Stanislav Bulygin (joint work with Ruud Pellikaan) University of Valladolid Valladolid, Spain March 14, 2008

More information

WEIGHT DISTRIBUTIONS OF SOME CLASSES OF BINARY CYCLIC CODES

WEIGHT DISTRIBUTIONS OF SOME CLASSES OF BINARY CYCLIC CODES Syracuse University SURFACE Electrical Engineering and Computer Science Technical Reports College of Engineering and Computer Science 3-1974 WEIGHT DISTRIBUTIONS OF SOME CLASSES OF BINARY CYCLIC CODES

More information

Alternant and BCH codes over certain rings

Alternant and BCH codes over certain rings Computational and Applied Mathematics Vol. 22, N. 2, pp. 233 247, 2003 Copyright 2003 SBMAC Alternant and BCH codes over certain rings A.A. ANDRADE 1, J.C. INTERLANDO 1 and R. PALAZZO JR. 2 1 Department

More information

arxiv: v1 [cs.it] 27 May 2017

arxiv: v1 [cs.it] 27 May 2017 Volume xx No 0x 20xx xxx-xxx doi:xxx ON SHORTENED AND PUNCTURED CYCLIC CODES arxiv:170509859v1 csit 27 May 2017 Arti Yardi IRIT/INP-ENSEEIHT University of Toulouse Toulouse France Ruud Pellikaan Department

More information

Cyclic codes: overview

Cyclic codes: overview Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)

More information

Ideals over a Non-Commutative Ring and their Application in Cryptology

Ideals over a Non-Commutative Ring and their Application in Cryptology Ideals over a Non-Commutative Ring and their Application in Cryptology E. M. Gabidulin, A. V. Paramonov and 0. V. Tretjakov Moscow Institute of Physics and Technology 141700 Dolgoprudnii Moscow Region,

More information

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields

More information

M 2 + s 2. Note that the required matrix A when M 2 + s 2 was also obtained earlier by Gordon [2]. (2.2) x -alxn-l-aex n-2 an

M 2 + s 2. Note that the required matrix A when M 2 + s 2 was also obtained earlier by Gordon [2]. (2.2) x -alxn-l-aex n-2 an SIAM J. ALG. DISC. METH. Vol. 1, No. 1, March 1980 1980 Society for. Industrial and Applied Mathematics 0196-52/80/0101-0014 $01.00/0 ON CONSTRUCTION OF MATRICES WITH DISTINCT SUBMATRICES* SHARAD V. KANETKAR"

More information

On Irreducible Polynomial Remainder Codes

On Irreducible Polynomial Remainder Codes 2011 IEEE International Symposium on Information Theory Proceedings On Irreducible Polynomial Remainder Codes Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering

More information

On The Weights of Binary Irreducible Cyclic Codes

On The Weights of Binary Irreducible Cyclic Codes On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:

More information

Channel Coding I. Exercises SS 2017

Channel Coding I. Exercises SS 2017 Channel Coding I Exercises SS 2017 Lecturer: Dirk Wübben Tutor: Shayan Hassanpour NW1, Room N 2420, Tel.: 0421/218-62387 E-mail: {wuebben, hassanpour}@ant.uni-bremen.de Universität Bremen, FB1 Institut

More information

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1) Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme

Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme P. Delsarte Philips Research Laboratory, Avenue Van Becelaere, 2 B-1170 Brussels, Belgium Y. Desmedt Katholieke Universiteit Leuven, Laboratorium

More information

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows. EE 387 October 28, 2015 Algebraic Error-Control Codes Homework #4 Solutions Handout #24 1. LBC over GF(5). Let G be a nonsystematic generator matrix for a linear block code over GF(5). 2 4 2 2 4 4 G =

More information

Groups. 3.1 Definition of a Group. Introduction. Definition 3.1 Group

Groups. 3.1 Definition of a Group. Introduction. Definition 3.1 Group C H A P T E R t h r e E Groups Introduction Some of the standard topics in elementary group theory are treated in this chapter: subgroups, cyclic groups, isomorphisms, and homomorphisms. In the development

More information

William Stallings Copyright 2010

William Stallings Copyright 2010 A PPENDIX E B ASIC C ONCEPTS FROM L INEAR A LGEBRA William Stallings Copyright 2010 E.1 OPERATIONS ON VECTORS AND MATRICES...2 Arithmetic...2 Determinants...4 Inverse of a Matrix...5 E.2 LINEAR ALGEBRA

More information

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1 Fifteenth International Workshop on Algebraic and Combinatorial Coding Theory June 18-24, 216, Albena, Bulgaria pp. 168 173 On the minimum distance of LDPC codes based on repetition codes and permutation

More information

Some Easily Decoded, Efficient, Burst Error Correcting Block Codes

Some Easily Decoded, Efficient, Burst Error Correcting Block Codes INFORMATION AND CONTROL 23, 234--244 (1973) Some Easily Decoded, Efficient, Burst Error Correcting Block Codes DAVID MANDELBAUM P.O. Box 645, Eatontown, New Jersey 07724 Single phased burst correcting

More information

Introduction to Series and Sequences Math 121 Calculus II Spring 2015

Introduction to Series and Sequences Math 121 Calculus II Spring 2015 Introduction to Series and Sequences Math Calculus II Spring 05 The goal. The main purpose of our study of series and sequences is to understand power series. A power series is like a polynomial of infinite

More information

Error Correction Review

Error Correction Review Error Correction Review A single overall parity-check equation detects single errors. Hamming codes used m equations to correct one error in 2 m 1 bits. We can use nonbinary equations if we create symbols

More information

ECEN 5682 Theory and Practice of Error Control Codes

ECEN 5682 Theory and Practice of Error Control Codes ECEN 5682 Theory and Practice of Error Control Codes Introduction to Algebra University of Colorado Spring 2007 Motivation and For convolutional codes it was convenient to express the datawords and the

More information

Chapter 1 Vector Spaces

Chapter 1 Vector Spaces Chapter 1 Vector Spaces Per-Olof Persson persson@berkeley.edu Department of Mathematics University of California, Berkeley Math 110 Linear Algebra Vector Spaces Definition A vector space V over a field

More information

CONSTRUCTION OF QUASI-CYCLIC CODES

CONSTRUCTION OF QUASI-CYCLIC CODES CONSTRUCTION OF QUASI-CYCLIC CODES by Thomas Aaron Gulliver B.Sc., 1982 and M.Sc., 1984 University of New Brunswick A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF

More information

ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes

ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes Kevin Buckley - 2010 109 ECE8771 Information Theory & Coding for Digital Communications Villanova University ECE Department Prof. Kevin M. Buckley Lecture Set 2 Block Codes m GF(2 ) adder m GF(2 ) multiplier

More information

LDPC codes based on Steiner quadruple systems and permutation matrices

LDPC codes based on Steiner quadruple systems and permutation matrices Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory September 7 13, 2014, Svetlogorsk (Kaliningrad region), Russia pp. 175 180 LDPC codes based on Steiner quadruple systems and

More information

Vector spaces. EE 387, Notes 8, Handout #12

Vector spaces. EE 387, Notes 8, Handout #12 Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is

More information

Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes

Decoding of the Five-Error-Correcting Binary Quadratic Residue Codes American Journal of Mathematical and Computer Modelling 2017; 2(1): 6-12 http://www.sciencepublishinggroup.com//amcm doi: 10.1168/.amcm.20170201.12 Decoding of the Five-Error-Correcting Binary Quadratic

More information

Chapter 4 Mathematics of Cryptography

Chapter 4 Mathematics of Cryptography Chapter 4 Mathematics of Cryptography Part II: Algebraic Structures Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 4.1 Chapter 4 Objectives To review the concept

More information

Idempotent Generators of Generalized Residue Codes

Idempotent Generators of Generalized Residue Codes 1 Idempotent Generators of Generalized Residue Codes A.J. van Zanten A.J.vanZanten@uvt.nl Department of Communication and Informatics, University of Tilburg, The Netherlands A. Bojilov a.t.bozhilov@uvt.nl,bojilov@fmi.uni-sofia.bg

More information

Channel Coding I. Exercises SS 2017

Channel Coding I. Exercises SS 2017 Channel Coding I Exercises SS 2017 Lecturer: Dirk Wübben Tutor: Shayan Hassanpour NW1, Room N 2420, Tel.: 0421/218-62387 E-mail: {wuebben, hassanpour}@ant.uni-bremen.de Universität Bremen, FB1 Institut

More information

Algebra & Trig. I. For example, the system. x y 2 z. may be represented by the augmented matrix

Algebra & Trig. I. For example, the system. x y 2 z. may be represented by the augmented matrix Algebra & Trig. I 8.1 Matrix Solutions to Linear Systems A matrix is a rectangular array of elements. o An array is a systematic arrangement of numbers or symbols in rows and columns. Matrices (the plural

More information

Binary construction of quantum codes of minimum distances five and six

Binary construction of quantum codes of minimum distances five and six Discrete Mathematics 308 2008) 1603 1611 www.elsevier.com/locate/disc Binary construction of quantum codes of minimum distances five and six Ruihu Li a, ueliang Li b a Department of Applied Mathematics

More information

Introduction to Binary Convolutional Codes [1]

Introduction to Binary Convolutional Codes [1] Introduction to Binary Convolutional Codes [1] Yunghsiang S. Han Graduate Institute of Communication Engineering, National Taipei University Taiwan E-mail: yshan@mail.ntpu.edu.tw Y. S. Han Introduction

More information

A Short Overview of Orthogonal Arrays

A Short Overview of Orthogonal Arrays A Short Overview of Orthogonal Arrays John Stufken Department of Statistics University of Georgia Isaac Newton Institute September 5, 2011 John Stufken (University of Georgia) Orthogonal Arrays September

More information

Trace Representation of Legendre Sequences

Trace Representation of Legendre Sequences C Designs, Codes and Cryptography, 24, 343 348, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Trace Representation of Legendre Sequences JEONG-HEON KIM School of Electrical and

More information

On the BMS Algorithm

On the BMS Algorithm On the BMS Algorithm Shojiro Sakata The University of Electro-Communications Department of Information and Communication Engineering Chofu-shi, Tokyo 182-8585, JAPAN Abstract I will present a sketch of

More information

Convergence analysis for a class of LDPC convolutional codes on the erasure channel

Convergence analysis for a class of LDPC convolutional codes on the erasure channel Convergence analysis for a class of LDPC convolutional codes on the erasure channel Sridharan, Arvind; Lentmaier, Michael; Costello Jr., Daniel J.; Zigangirov, Kamil Published in: [Host publication title

More information

An Optimum Symbol-by Symbol decoding rule for linear codes

An Optimum Symbol-by Symbol decoding rule for linear codes Syracuse University SURFACE Electrical Engineering and Computer Science Technical Reports College of Engineering and Computer Science 9-1975 An Optimum Symbol-by Symbol decoding rule for linear codes Carlos

More information

Generalized hyper-bent functions over GF(p)

Generalized hyper-bent functions over GF(p) Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G

More information

An Introduction to Low Density Parity Check (LDPC) Codes

An Introduction to Low Density Parity Check (LDPC) Codes An Introduction to Low Density Parity Check (LDPC) Codes Jian Sun jian@csee.wvu.edu Wireless Communication Research Laboratory Lane Dept. of Comp. Sci. and Elec. Engr. West Virginia University June 3,

More information

Interleaver Design for Turbo Codes

Interleaver Design for Turbo Codes 1 Interleaver Design for Turbo Codes H. R. Sadjadpour, N. J. A. Sloane, M. Salehi, and G. Nebe H. Sadjadpour and N. J. A. Sloane are with AT&T Shannon Labs, Florham Park, NJ. E-mail: sadjadpour@att.com

More information

g(x) = 1 1 x = 1 + x + x2 + x 3 + is not a polynomial, since it doesn t have finite degree. g(x) is an example of a power series.

g(x) = 1 1 x = 1 + x + x2 + x 3 + is not a polynomial, since it doesn t have finite degree. g(x) is an example of a power series. 6 Polynomial Rings We introduce a class of rings called the polynomial rings, describing computation, factorization and divisibility in such rings For the case where the coefficients come from an integral

More information

Höst, Stefan; Johannesson, Rolf; Zigangirov, Kamil; Zyablov, Viktor V.

Höst, Stefan; Johannesson, Rolf; Zigangirov, Kamil; Zyablov, Viktor V. Active distances for convolutional codes Höst, Stefan; Johannesson, Rolf; Zigangirov, Kamil; Zyablov, Viktor V Published in: IEEE Transactions on Information Theory DOI: 101109/18749009 Published: 1999-01-01

More information

k-protected VERTICES IN BINARY SEARCH TREES

k-protected VERTICES IN BINARY SEARCH TREES k-protected VERTICES IN BINARY SEARCH TREES MIKLÓS BÓNA Abstract. We show that for every k, the probability that a randomly selected vertex of a random binary search tree on n nodes is at distance k from

More information

Which Codes Have 4-Cycle-Free Tanner Graphs?

Which Codes Have 4-Cycle-Free Tanner Graphs? Which Codes Have 4-Cycle-Free Tanner Graphs? Thomas R. Halford and Keith M. Chugg Communication Sciences Institute University of Southern California Los Angeles, CA 90089-565, USA Email: {halford, chugg}@usc.edu

More information

Reverse Berlekamp-Massey Decoding

Reverse Berlekamp-Massey Decoding Reverse Berlekamp-Massey Decoding Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering ETH Zurich, Switzerland Email: {yu, loeliger}@isi.ee.ethz.ch arxiv:1301.736v

More information

Construction of latin squares of prime order

Construction of latin squares of prime order Construction of latin squares of prime order Theorem. If p is prime, then there exist p 1 MOLS of order p. Construction: The elements in the latin square will be the elements of Z p, the integers modulo

More information

Some Extended Results on the Search for Good Convolutional Codes

Some Extended Results on the Search for Good Convolutional Codes 1682 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 43, NO 5, SEPTEMBER 1997 Some Extended Results on the Search for Good Convolutional Codes Jinn-Ja Chang, Member, IEEE, Der-June Hwang, and Mao-Chao Lin,

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

Statistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study

Statistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study International Journal of Foundations of Computer Science c World Scientific Publishing Company Statistical Properties of the Arithmetic Correlation of Sequences Mark Goresky School of Mathematics Institute

More information

Rings If R is a commutative ring, a zero divisor is a nonzero element x such that xy = 0 for some nonzero element y R.

Rings If R is a commutative ring, a zero divisor is a nonzero element x such that xy = 0 for some nonzero element y R. Rings 10-26-2008 A ring is an abelian group R with binary operation + ( addition ), together with a second binary operation ( multiplication ). Multiplication must be associative, and must distribute over

More information

SOLVING SOLVABLE QUINTICS. D. S. Dummit

SOLVING SOLVABLE QUINTICS. D. S. Dummit D. S. Dummit Abstract. Let f(x) = x 5 + px 3 + qx + rx + s be an irreducible polynomial of degree 5 with rational coefficients. An explicit resolvent sextic is constructed which has a rational root if

More information

Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra

Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra D. R. Wilkins Contents 3 Topics in Commutative Algebra 2 3.1 Rings and Fields......................... 2 3.2 Ideals...............................

More information

Some Results on the Arithmetic Correlation of Sequences

Some Results on the Arithmetic Correlation of Sequences Some Results on the Arithmetic Correlation of Sequences Mark Goresky Andrew Klapper Abstract In this paper we study various properties of arithmetic correlations of sequences. Arithmetic correlations are

More information

Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases

Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases 1 Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases H. Fan and M. A. Hasan March 31, 2007 Abstract Based on a recently proposed Toeplitz

More information