On designs and Steiner systems over finite fields

Size: px
Start display at page:

Download "On designs and Steiner systems over finite fields"

Transcription

1 On designs and Steiner systems over finite fields Alfred Wassermann Department of Mathematics, Universität Bayreuth, Germany Special Days on Combinatorial Construction Using Finite Fields, Linz 2013

2 Outline Network coding Design theory Symmetry Computer construction Projective geometry New results (joint work with M. Braun, T. Etzion, A. Kohnert, P. Östergård, A. Vardy) Summary

3 Network coding

4 Flow network source directed graph, with sources and sinks each edge e has a capacity c e each edge receives a non-negative flow ƒ e c e the net flow into any non-source non-sink vertex is zero sink sink In the following: c e = 1 ƒ e {0, 1}

5 Flow networks Theorem (Ford, Fulkerson 1956, Elias, Feinstein, Shannon 1956) In a flow network, the maximum amount of flow passing from a source s to a sink t is equal to the minimum capacity, which when removed, separates s from t. Theorem (Menger 1927) Maximum number of edge-disjoint paths from s to t in a directed graph is equal to the minimum s-t cut.

6 Example: 1 source, 1 sink source cut-capacity = 2 min-cut = 2 = max-flow Menger s theorem: two edge-disjoint paths route packets and b along these paths sink

7 Example: 1 source, 1 sink source b b b cut-capacity = 2 min-cut = 2 = max-flow Menger s theorem: two edge-disjoint paths route packets and b along these paths sink b

8 Example: 1 source, 2 sinks source cut-capacity = 2 can route 2 packets to one sink, 1 packet to the other and vice-versa Time-sharing between these two strategies can achieve a multicast rate of 1.5 packets per use of the network. sink sink

9 Example: 1 source, 2 sinks source b b b cut-capacity = 2 can route 2 packets to one sink, 1 packet to the other and vice-versa Time-sharing between these two strategies can achieve a multicast rate of 1.5 packets per use of the network. sink b b sink

10 Example: 1 source, 2 sinks source b b cut-capacity = 2 can route 2 packets to one sink, 1 packet to the other and vice-versa Time-sharing between these two strategies can achieve a multicast rate of 1.5 packets per use of the network. sink sink

11 Example: 1 source, 2 sinks source b b b b b b sink sink perform coding at the bottle-neck and b are packets of bits b = + b over F 2 ( b) = b b ( b) = both sinks can recover both messages Network coding achieves a multicast rate of 2 packets per use of the network best possible

12 Network coding essence R. Ahlswede, N. Cai, S.-Y. R. Li, R. W. Yeung 2000 packets can be mixed with each other rather than just routed or replicated a higher throughput can be achieved

13 Error correction in noncoherent network coding R. Kötter F. Kschischang Kötter, Kschischang (2008) Silva, Kötter, Kschischang (2008)

14 Error correction in noncoherent network coding Possible error sources: Random errors that could not be detected at the physical layer Corrupt packets injected at the application level by a malicious user

15 Error correction in noncoherent network coding Possible error sources: Random errors that could not be detected at the physical layer Corrupt packets injected at the application level by a malicious user Local view at routing node: Randomly combine incoming packets linearly A corrupt packet is modeled as the addition of an error packet to a genuine packet P (o t) = m j=1 j P (in) j + E

16 Error propagation Packet mixing makes network coding highly prone to error propagation. This essentially rules out classical error correction.

17 Error correction in noncoherent network coding Global view: The overall network can be viewed as a point-to-point channel X 1 X 2 Source: X = X, Y j F q Transmission:. X k sink: Y = Y 1 Y 2. Y k X Y = A X + B E, where A, B, E are unknown

18 Key observation X Y = A X + B E In case E = 0: X Y = A X rows of A X X 1, X 2,..., X k (= row space of X)

19 Random linear network coding Randomly combine information vectors at intermediate nodes Codewords are subspaces of a finite vector space Convenient: all codewords have same dimension k

20 Network codes ambient space V = F q constant dimension (network) code: C {U F : dim U = k} q Grassmannian: G q (, k) := {U F : dim U = k} q H. Graßmann

21 Subspace lattice of F G 2 (4, 4) G 2 (4, 3) G 2 (4, 2) 0001 G 2 (4, 1) 0000 G 2 (4, 0)

22 Subspace lattice G q (, k) = k Gaussian coefficient: k lim q 1 k q q = (q 1)(q 1 1) (q k+1 1) (q k 1)(q k 1 1) (q 1) q = k

23 Subspace distance subspace distance for U, V G q (, k) d(u, V) = dim U + dim V 2 dim U V = 2k 2 dim U V =: 2δ minimum distance d(c) := min{d(u, V) : U, V C, U = V}

24 Subspace distance in F 4 2 G 2 (4, 4) G 2 (4, 3) G 2 (4, 2) G 2 (4, 1) G 2 (4, 0)

25 Problems maximize C for given, k, d determine upper and lower bounds for A q (, k, d) := m x{ C : C G q (, k), d(c) d}

26 Upper bounds Sphere packing bound: A q (, k, 2δ) G q(, k) B k (δ 1) Singleton bound: A q (, k, 2δ) δ+1 k δ+1 q Anticode bound: Anticode of diameter e: set of subspaces U G q (, k) such that all pairwise distances are e k Aq (, k, 2δ) Johnson type bounds: A q (, k, 2δ) q k+δ 1 δ 1 q q 1 = k δ+1 q k k δ+1 q q k 1 A q( 1, k 1, 2δ)

27 Previous bounds for A 2 (, 3, 4) Ref [K] [B] [B] [E] [K] [B] [B] [B] [K] Kohnert, Kurz (2008) [E] Etzion, Vardy (2008) [B] Braun, Reichelt (2013) U V dim 3 = k {0} dim 1

28 Constant dimension codes U, V G q (, k): d(u, V) = 2k 2 dim U V = 2δ Let t 1 := k δ U V dim k δ W U V dim t dim t 1 d(c) = 2δ: dim U V t 1 for all U, V C, U = V For all W G q (, t): {U C : W U} 1

29 Extremal case C G q (, k) For all W G q (, t): {U C : W U} 1

30 Extremal case C G q (, k) For all W G q (, t): {U C : W U} 1 Extremal case: for all W G q (, t) {U C : W U} = 1

31 Extremal case C G q (, k) For all W G q (, t): {U C : W U} 1 Extremal case: for all W G q (, t) {U C : W U} = 1 In this case, C meets anticode bound and Johnson bound: t C = q k t C: perfect diameter code q = k δ+1 q k k δ+1 q

32 Design theory

33 Design theory Cameron (1974), Delsarte (1976) B G q (, k): set of k-subspaces (blocks) (F q, B): q-steiner system S q[t, k, ] P. Cameron each t-subspace of F is contained in q exactly one block of B

34 Design theory Cameron (1974), Delsarte (1976) B G q (, k): set of k-subspaces (blocks) (F q, B): q-steiner system S q[t, k, ] More general: P. Cameron each t-subspace of F is contained in q exactly one block of B B G q (, k): set of k-subspaces (blocks) (F q, B): t-(, k, λ; q) design over F q each t-subspace of F q exactly λ blocks of B is contained in

35 Design theory B set: simple design B multiset: non-simple design

36 Design theory B set: simple design B multiset: non-simple design B = G q (, k) is a t-(, k, t ; q) design: trivial k t q design trivial 1-(4, 2, 7; 2) design

37 Design theory B set: simple design B multiset: non-simple design B = G q (, k) is a t-(, k, t ; q) design: trivial k t q design trivial 1-(4, 2, 7; 2) design 1-(4, 2, 1; 2) design

38 t-(, k, λ; q) designs B = λ [ t] q [ k t] q Necessary conditions: λ = λ t q k t q Z for = 0,..., t Example: t = 2, k = 3, λ = 1 1, 3 (mod 6)

39 Related design parameters t-(, k, λ; q) design supplemented design: t-(, k, t k t q λ; q) complementary design: t-(, k, λ t reduced design: (t 1)-(, k, λ t+1 1 derived design: (t 1)-( 1, k 1, λ; q) k q / t k t q / k t+1 1 residual design: (t 1)-( 1, k, λ q k 1 q t+1 1 ; q) Kiermaier, Laue (2013) Open problem: t (t + 1)? q ; q) q ; q)

40 t-designs (over sets) V: set of points, V =. B: set of k-subsets K (blocks) (V, B): t-(, k, λ) design K V and K = k Every t-subset T V is contained in exactly λ blocks of B. t-(, k, 1) design: Steiner system S(t, k, ) J. Plücker 1835 T. Kirkman 1844 J. Steiner 1853 R. Fisher 1926

41 Example 4 d a c b 2 Task: Cover every vertex (1- subset) by exactly one edge (2-subset): 1-(4, 2, 1) design

42 Example 4 d a c b 2 Task: Cover every vertex (1- subset) by exactly one edge (2-subset): 1-(4, 2, 1) design 3 d a 1 design 1 c b d 4 a design 2 c b 2 d 5 c a 6 b design 3

43 t-designs (over sets) designs over finite fields are also called q-analogs related design parameters t (t + 1) Ajoodani-Namini (1996)

44 Large sets of designs (over sets) the set of all k-subsets is a t-(, k, t k t ) design: trivial design a partition of the trivial design into N disjoint t-(, k, λ) designs is called large set N λ = t k t LS[N](t, k, ) Sylvester (1860): packing large set of disjoint designs, Lindner, Rosa (1975)

45 Large sets of designs over finite fields G q (, k) is a t-(, k, n t ; q) design k t q Large set LS q [N](t, k, ): partition of G q (, k) into N disjoint t-(, k, λ; q) designs LS 2 [7](1, 2, 4) Necessary: N λ = t k t q

46 Symmetry

47 Automorphisms Designs over sets: S : symmetric group σ S is automorphism: B σ = B d c Example: 4 2 σ = ( d)(bc) a b Set of automorphisms: automorphism group

48 Automorphisms Designs over sets: S : symmetric group σ S is automorphism: B σ = B d c Example: 4 2 σ = ( d)(bc) a b Set of automorphisms: automorphism group Designs over finite fields: P L(, q) projective semilinear group GL(, q) = {M F : M invertible} q σ P L(, q) automorphism: B σ = B

49 Automorphisms of designs over finite fields Singer cycle: take F q as an element of F q (Fq \ {0}, ) is a cyclic group G of order q 1, i.e. G = σ G GL(, q) is called Singer cycle Frobenius automorphism: ϕ : Fq F q, U U q ϕ = σ, ϕ = (q 1) odd prime: σ, ϕ maximal subgroup in GL(, q) (Kantor 1980, Dye 1989)

50 Computer construction

51 Brute force approach for construction incidence matrix between t-subset and k-subsets: 1 if T K j M t,k = (m,j ), where m,j = 0 else solve M t,k = λ λ. λ for 0/1-vector

52 Example d 3 c d 4 c 2 d 5 c a 1 design 1 b a design 2 b 6 a design 3 b 4 d a c b 2 M 1, a b c d design design design 3 1 1

53 Designs with prescribed automorphism group Construction of designs with prescribed automorphism group choose group G acting on V, i.e. G S search for t-designs D = (V, B) having G as a group of automorphisms, i.e. for all construct D = (V, B) as g G and K B = K g B. union of orbits of G on k-subsets.

54 Example: cyclic symmetry d 4 a d c 2 b c a b c d {1, 2, 3, 4} {5, 6} a 2 1 b 2 1 c 2 1 d 2 1 a 6 b {1, 2, 3, 4} {5, 6} {a, b, c, d} 2 1 design 3

55 The method of Kramer and Mesner Definition K V and K = k: K G := {K g g G} T V and T = t: T G := {T g g G} Let V K G 1 KG 2... KG n k and T G 1 TG 2... TG m = V t M G t,k = (m,j) where m,j := {K K G j T K}

56 The method of Kramer and Mesner Theorem (Kramer and Mesner, 1976) The union of orbits corresponding to the 1s in a {0, 1} vector which solves M G t,k = is a t-(, k, λ) design having G as an automorphism group. λ λ. λ

57 Expected gain Brute force approach: M t,k = t k Kramer-Mesner: M G t,k ( t) ( k) G G

58 Solving algorithms t-designs with λ > 1: integer programming (CPLEX, Gurobi) lattice basis reduction + exhaustive enumeration (W. 1998, 2002) heuristic algorithms t-designs with λ = 1: maximum clique algorithms (Östergård: cliquer) exact cover (Knuth: dancing links)

59 Applications of Kramer-Mesner in Bayreuth (Betten, Braun, Kerber, Kiermaier, Kohnert, Kurz, Laue, W., Vogel, Zwanzger) designs over sets designs over finite fields large sets of designs linear codes self-orthogonal codes ring-linear codes two-weight codes arcs, blocking sets in projective geometry

60 Known designs over finite fields

61 Families of designs Thomas (1987): 2-(, 3, 7; 2) for 7 and ±1 (mod 6) Suzuki (1989): 2-(, 3, q 2 + q + 1; q) for 7 and ±1 (mod 6) Miyakawa, Munemasa, Yoshiara (1995): transitive designs 2-(7, 3, λ; q) for q = 2, 3 Itoh (1998): From 2-(, 3, q 3 (q 5 1)/(q 1); q) to 2-(m, 3, q 3 (q 5 1)/(q 1); q)

62 Designs over F 2 by computer construction Braun, Kerber, Laue (2005), S. Braun (2010) t-(, k, λ; q) G M G t,k λm x λ 3-(8, 4, λ; 2) σ, ϕ , 15 2-(10, 3, λ; 2) σ, ϕ , 30, 45, 60, 75, 90, 105, (9, 4, λ; 2) σ, ϕ , 63, 84, 126, 147, 189, 210, 252, 273, 315, 336, 378, 399, 441, 462, 504, 525, 567, 576, 588, 630, 651, 693, 714, 756, 777, 819, 840, 882, 903, 945, 966, 1008, 1029, 1071, 1092, 1134, 1155, 1197, 1218, 1260, 1281, (9, 3, λ; 2) σ, ϕ , 22, 42, 43, 63 2-(8, 4, λ; 2) σ, ϕ , 35, 56, 70, 91, 105, 126, 140, 161, 175, 196, 210, 231, 245, 266, 280, 301, (8, 3, λ; 2) σ (7, 3, λ; 2) σ , 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15 2-(6, 3, λ; 2) σ , 6 σ: Singer cycle, ϕ: Frobenius automorphism

63 Projective geometry

64 Projective geometry projective space PG( 1, q) spread in PG( 1, q): set of lines that partitions the points, i.e. S q [1, 2, ]

65 Projective geometry projective space PG( 1, q) spread in PG( 1, q): set of lines that partitions the points, i.e. S q [1, 2, ] (k 1)-spread in PG( 1, q): S q [1, k, ] (k 1)-spreads exist iff k divides

66 Projective geometry projective space PG( 1, q) spread in PG( 1, q): set of lines that partitions the points, i.e. S q [1, 2, ] (k 1)-spread in PG( 1, q): S q [1, k, ] (k 1)-spreads exist iff k divides (t 1, k 1)-spreads in PG( 1, q): S q [t, k, ] also called (t, k 1)-systems in PG(, q), Ceccherini (1967), Tallini (1975)

67 Projective geometry spreads

68 Projective geometry spreads Motivation: André, Bose, Bruck construction (1954): spreads translation planes Spread codes and spread decoding in network codes (Manganiello, Gorla, Rosenthal 2008) Large set of spreads: parallelism, packing

69 Projective geometry (s, r)-spreads Beutelspacher 1978: Es scheint unbekannt zu sein, ob in einem endlichen projektiven Raum der Dimension d eine (s, r)-faserung existieren kann, wenn 0 < s < r < d gilt. Conjecture (Metsch 1999): (s, r)-spreads in finite projective spaces do not exist for s > 0.

70 Projective geometry (s, r)-spreads (s, r)-spreads in finite projective spaces do not exist for s > 0. translates to S q [t, k, ] Steiner systems over finite fields do not exist for t > 1.

71 New results

72 S 2 [2, 3, 13] does exist Braun, Etzion, Östergård, Vardy, W. (2013) submitted

73 S 2 [2, 3, 13] 13 = # blocks: 13 2 / 3 = Kramer-Mesner with group G = ϕ, σ ϕ = , σ = G = 13 (2 13 1) = all orbits are of full length G

74 S 2 [2, 3, 13] Kramer-Mesner matrix M G 2,3 = M G = ,3 # columns containing 0, 1 only = use dancing links by Knuth to solve the system up to now: 1030 non-isomorphic solutions 630 disjoint solutions i.e. 2-(13, 3, λ; 2) exist for λ = 1, 2,..., 630

75 Why Singer cycle + Frobenius? Transitive designs: A group G acts t-transitively on a vector space V if the set of t-subspaces is a single orbit. Theorem (Cameron, Kantor 1979) If G GL(, q) is t-transitive with t 2 then G is also k-transitive for t < k.

76 Miyakawa, Munemasa, Yoshiara 1995 Theorem (Hering 1974, Liebeck 1987) If G GL(, q) acts transitively on the 1-subspaces of F with 6, then one of the following holds: q G σ, ϕ SL (q n/ ) G, where, 2 Sp 2 (q /2 ) G, where 2 G 2 (q /6 ) G < Sp 6 (q /6 ), few sporadic cases for = 6 where q = 2 m and 6

77 The first large sets for t 2 LS 2 [3](2, 3, 8) does exist 2 Consists of three disjoint 2-(8, 3, 21; 2) designs Group: Singer cycle in GL(8, 2) of order 255 LS2 [3](2, 5, 8) does exist (complementary design) LS 3 [2](2, 3, 6) does exist Consists of two disjoint 2-(6, 3, 20; 3) designs LS 5 [2](2, 3, 6) does exist Consists of two disjoint 2-(6, 3, 20; 5) designs 2 Braun, Kohnert, Östergård, W. (2013) submitted

78 Summary

79 Bounds for A 2 (, 3, 4) Ref [K], [H] [B] [B] [E] [K] [B] [B] [B] [K] Kohnert, Kurz (2008) [E] Etzion, Vardy (2008) [B] Braun, Reichelt (2013) [H] Honold, Kiermaier, Kurz (2013) U V dim 3 = k dim 2 = t dim 1 {0}

80 Designs over sets vs. finite fields designs over sets designs over finite fields constructions for t 9 constructions for t = 2, 3 designs exist for all t (Teirlinck 1986) designs exist for all t (Fazely, Lovett, Vardy 2013) t-design (t + 1)-designs? Steiner systems are known for t 5 t > 5? Steiner systems are known for t = 1 (k-spreads) and S 2 [2, 3, 13] S(2, 3, ) direct constructions? recursive constructions: S(2, 3, ) S(2, 3, 2 + 1) S(2, 3, ) S(2, 3, 3 ) S(2, 3, ), S(2, 3, ) S(2, 3, )?

81 Open problems Computer free description for S 2 [2, 3, 13] known: n = 13 is the smallest possible case having a Singer cycle as automorphism group (computer search) open: Are there S 2 [2, 3, ] for other groups? S 2 [2, 3, 7]? Infinite series? Problems on q-analogs in Coding Theory, T. Etzion (2013)

82 Thank you for listening!

Fundamentals of Coding For Network Coding

Fundamentals of Coding For Network Coding Fundamentals of Coding For Network Coding Marcus Greferath and Angeles Vazquez-Castro Aalto University School of Sciences, Finland Autonomous University of Barcelona, Spain marcus.greferath@aalto.fi and

More information

Designs over the binary field from the complete monomial group

Designs over the binary field from the complete monomial group AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 67(3) (2017), Pages 470 475 Designs over the binary field from the complete monomial group Michael Braun Faculty of Computer Science University of Applied Sciences

More information

The Impact of Network Coding on Mathematics

The Impact of Network Coding on Mathematics The Impact of Network Coding on Mathematics Eimear Byrne University College Dublin DIMACS Workshop on Network Coding: the Next 15 Years Dec 15-17, 2015 Random Network Coding and Designs Over GF (q) COST

More information

Codes and Designs in the Grassmann Scheme

Codes and Designs in the Grassmann Scheme Codes and Designs in the Grassmann Scheme Tuvi Etzion Computer Science Department Technion -Israel Institute of Technology etzion@cs.technion.ac.il ALGEBRAIC COMBINATORICS AND APPLICATIONS ALCOMA10, Thurnau,

More information

Some New Large Sets of Geometric Designs

Some New Large Sets of Geometric Designs Spyros S. Magliveras Department of Mathematical Sciences Florida Atlantic University Boca Raton, Florida, U.S.A. First annual Kliakhandler Conference Algebraic Combinatorics and Applications Houghton,

More information

THE ORDER OF THE AUTOMORPHISM GROUP OF A BINARY q-analog OF THE FANO PLANE IS AT MOST TWO

THE ORDER OF THE AUTOMORPHISM GROUP OF A BINARY q-analog OF THE FANO PLANE IS AT MOST TWO THE ORDER OF THE AUTOMORPHISM GROUP OF A BINARY -ANALOG OF THE FANO PLANE IS AT MOST TWO MICHAEL KIERMAIER, SASCHA KURZ, AND ALFRED WASSERMANN Abstract. It is shown that the automorphism group of a binary

More information

Derived and Residual Subspace Designs

Derived and Residual Subspace Designs Derived and Residual Subspace Designs Michael Kiermaier, Reinhard Laue Universität Bayreuth, michael.kiermaier@uni-bayreuth.de, laue@uni-bayreuth.de Abstract A generalization of forming derived and residual

More information

Constructing network codes using Möbius transformations

Constructing network codes using Möbius transformations Constructing network codes using Möbius transformations Andreas-Stephan Elsenhans and Axel Kohnert November 26, 2010 Abstract We study error correcting constant dimension subspace codes for network coding.

More information

New arcs in projective Hjelmslev planes over Galois rings

New arcs in projective Hjelmslev planes over Galois rings New arcs in projective Hjelmslev planes over Galois rings Michael Kiermaier and Axel Kohnert ABSTRACT. It is known that some good linear codes over a finite ring (R-linear codes) arise from interesting

More information

On Linear Subspace Codes Closed under Intersection

On Linear Subspace Codes Closed under Intersection On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F

More information

arxiv: v2 [math.co] 2 May 2018

arxiv: v2 [math.co] 2 May 2018 A SUBSPACE CODE OF SIZE 333 IN THE SETTING OF A BINARY q-analog OF THE FANO PLANE DANIEL HEINLEIN, MICHAEL KIERMAIER, SASCHA KURZ, AND ALFRED WASSERMANN arxiv:1708.06224v2 [math.co] 2 May 2018 Abstract.

More information

Combinatorial Designs Man versus Machine

Combinatorial Designs Man versus Machine Combinatorial Designs Man versus Machine Anamari Nakić Department of Energy and Power Systems Faculty of Electrical Engineering and Computing University of Zagreb Zagreb 2015 1 / 47 The theory of combinatrial

More information

Asymptotic bounds for the sizes of constant dimension codes and an improved lower bound

Asymptotic bounds for the sizes of constant dimension codes and an improved lower bound Asymptotic bounds for the sizes of constant dimension codes and an improved lower bound 5th ICMCTA Vihula Manor, 28-31 August 2017 Daniel Heinlein University of Bayreuth, Germany Daniel.Heinlein@uni-bayreuth.de

More information

make some group constructions. The resulting group is then prescribed as an automorphism group of the desired designs. Any such design is a collection

make some group constructions. The resulting group is then prescribed as an automorphism group of the desired designs. Any such design is a collection New t-designs and large sets of t-designs Anton Betten 1, Reinhard Laue, Alfred Wassermann Mathematical Department, University of Bayreuth, D-95440 Bayreuth, Germany Abstract Recent results in the search

More information

k-subsets of V: Finding a collection which forms a t-design is equivalent to the problem of solving a system of diophantine equations, as mentioned ab

k-subsets of V: Finding a collection which forms a t-design is equivalent to the problem of solving a system of diophantine equations, as mentioned ab Simple 6- and 7-designs on 19 to 33 points Anton Betten 1, Reinhard Laue, Alfred Wassermann Universitat Bayreuth, Lehrstuhl II fur Mathematik, Lehrstuhl fur Mathematik und ihre Didaktik, D-95440 Bayreuth

More information

Mathematical Department, University of Bayreuth, D Bayreuth

Mathematical Department, University of Bayreuth, D Bayreuth ,, {6 () c Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. A Steiner 5-Design on 36 Points ANTON BETTEN anton.betten@uni-bayreuth.de REINHARD LAUE reinhard.laue@uni-bayreuth.de ALFRED

More information

Abstract. the aid of a computer. The smallest parameter set found is 7-(24; 8; 4): for determining the isomorphism types. Further designs are derived

Abstract. the aid of a computer. The smallest parameter set found is 7-(24; 8; 4): for determining the isomorphism types. Further designs are derived Some simple 7-designs A. Betten R. Laue A. Wassermann Abstract Some simple 7-designs with small parameters are constructed with the aid of a computer. The smallest parameter set found is 7-(24; 8; 4):

More information

The Simple 7-(33,8,10)-Designs with Automorphism Group PΓL(2,32)

The Simple 7-(33,8,10)-Designs with Automorphism Group PΓL(2,32) The Simple 7-(33,8,10)-Designs with Automorphism Group PΓL(2,32) Alfred Wassermann Abstract Lattice basis reduction in combination with an efficient backtracking algorithm is used to find all (4 996 426)

More information

PROJECTIVE DIVISIBLE BINARY CODES

PROJECTIVE DIVISIBLE BINARY CODES PROJECTIVE DIVISIBLE BINARY CODES DANIEL HEINLEIN, THOMAS HONOLD, MICHAEL KIERMAIER, SASCHA KURZ, AND ALFRED WASSERMANN Abstract. For which positive integers n, k, r does there exist a linear [n, k] code

More information

Large sets of t designs from groups

Large sets of t designs from groups Large sets of t designs from groups Spyros S. Magliveras Department of Mathematical Sciences Florida Atlantic University Boca Raton, Florida 33431-0991 Dedicated to Alex Rosa on the occasion of his 70th

More information

CONSTRUCTION OF (SOMETIMES) OPTIMAL LINEAR CODES

CONSTRUCTION OF (SOMETIMES) OPTIMAL LINEAR CODES CONSTRUCTION OF (SOMETIMES) OPTIMAL LINEAR CODES MICHAEL BRAUN, AXEL KOHNERT AND ALFRED WASSERMANN 1. INTRODUCTION For the purpose of error correcting linear codes over a finite field GF (q) and fixed

More information

Network Coding and Schubert Varieties over Finite Fields

Network Coding and Schubert Varieties over Finite Fields Network Coding and Schubert Varieties over Finite Fields Anna-Lena Horlemann-Trautmann Algorithmics Laboratory, EPFL, Schweiz October 12th, 2016 University of Kentucky What is this talk about? 1 / 31 Overview

More information

Probabilistic construction of t-designs over finite fields

Probabilistic construction of t-designs over finite fields Probabilistic construction of t-designs over finite fields Shachar Lovett (UCSD) Based on joint works with Arman Fazeli (UCSD), Greg Kuperberg (UC Davis), Ron Peled (Tel Aviv) and Alex Vardy (UCSD) Gent

More information

The Hamming Codes and Delsarte s Linear Programming Bound

The Hamming Codes and Delsarte s Linear Programming Bound The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the

More information

An Introduction to (Network) Coding Theory

An Introduction to (Network) Coding Theory An Introduction to (Network) Coding Theory Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland July 12th, 2018 1 Coding Theory Introduction Reed-Solomon codes 2 Introduction Coherent network

More information

TABLES OF SUBSPACE CODES

TABLES OF SUBSPACE CODES TABLES OF SUBSPACE CODES DANIEL HEINLEIN, MICHAEL KIERMAIER, SASCHA KURZ, AND ALFRED WASSERMANN ABSTRACT. The main problem of subspace coding asks for the maximum possible cardinality of a subspace code

More information

A Course in Combinatorics

A Course in Combinatorics A Course in Combinatorics J. H. van Lint Technical Universüy of Eindhoven and R. M. Wilson California Institute of Technology H CAMBRIDGE UNIVERSITY PRESS CONTENTS Preface xi 1. Graphs 1 Terminology of

More information

1 Fields and vector spaces

1 Fields and vector spaces 1 Fields and vector spaces In this section we revise some algebraic preliminaries and establish notation. 1.1 Division rings and fields A division ring, or skew field, is a structure F with two binary

More information

The Witt designs, Golay codes and Mathieu groups

The Witt designs, Golay codes and Mathieu groups The Witt designs, Golay codes and Mathieu groups 1 The Golay codes Let V be a vector space over F q with fixed basis e 1,..., e n. A code C is a subset of V. A linear code is a subspace of V. The vector

More information

11 Block Designs. Linear Spaces. Designs. By convention, we shall

11 Block Designs. Linear Spaces. Designs. By convention, we shall 11 Block Designs Linear Spaces In this section we consider incidence structures I = (V, B, ). always let v = V and b = B. By convention, we shall Linear Space: We say that an incidence structure (V, B,

More information

Enumerative Encoding in the Grassmannian Space

Enumerative Encoding in the Grassmannian Space Enumerative Encoding in the Grassmannian Space Natalia Silberstein Department of omputer Science Technion-Israel Institute of Technology Haifa 3 Israel Email: natalys@cstechnionacil Tuvi Etzion Department

More information

Communication over Finite-Ring Matrix Channels

Communication over Finite-Ring Matrix Channels Communication over Finite-Ring Matrix Channels Chen Feng 1 Roberto W. Nóbrega 2 Frank R. Kschischang 1 Danilo Silva 2 1 Department of Electrical and Computer Engineering University of Toronto, Canada 2

More information

arxiv: v1 [cs.it] 7 Apr 2015

arxiv: v1 [cs.it] 7 Apr 2015 New Lower Bounds for the Shannon Capacity of Odd Cycles arxiv:1504.01472v1 [cs.it] 7 Apr 2015 K. Ashik Mathew and Patric R. J. Östergård April 8, 2015 Abstract The Shannon capacity of a graph G is defined

More information

Constructing t-designs with prescribed automorphism groups

Constructing t-designs with prescribed automorphism groups Constructing t-designs with prescribed automorphism groups 2 Mario Osvin Pavčević University of Zagreb Croatia e-mail: mario.pavcevic@fer.hr /37 Dear organizers, thank you very much for the invitation!

More information

q-analogs of group divisible designs

q-analogs of group divisible designs -analogs of group divisible designs Marco Buratti, Michael Kiermaier, Sascha Kurz, Anamari Nakić, Alfred Wassermann September 7, 208 Abstract A well known class of objects in combinatorial design theory

More information

Galois geometries contributing to coding theory

Galois geometries contributing to coding theory Ghent University Dept. of Mathematics Krijgslaan 281 - S22 9000 Ghent Belgium Opatija, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 COVERING RADIUS AND SATURATING SETS 4 LINEAR MDS CODES

More information

Tight Sets and m-ovoids of Quadrics 1

Tight Sets and m-ovoids of Quadrics 1 Tight Sets and m-ovoids of Quadrics 1 Qing Xiang Department of Mathematical Sciences University of Delaware Newark, DE 19716 USA xiang@mathudeledu Joint work with Tao Feng and Koji Momihara 1 T Feng, K

More information

Galois geometries contributing to coding theory

Galois geometries contributing to coding theory Ghent University Dept. of Pure Mathematics and Computer Algebra Krijgslaan 281 - S22 9000 Ghent Belgium Thurnau, April 15, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 EXTENDABILITY RESULTS

More information

An Introduction to (Network) Coding Theory

An Introduction to (Network) Coding Theory An to (Network) Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland April 24th, 2018 Outline 1 Reed-Solomon Codes 2 Network Gabidulin Codes 3 Summary and Outlook A little bit of history

More information

Unsolved Problems in Graph Theory Arising from the Study of Codes*

Unsolved Problems in Graph Theory Arising from the Study of Codes* Unsolved Problems in Graph Theory Arising from the Study of Codes* N. J. A. Sloane Mathematical Sciences Research Center AT&T Bell Laboratories Murray Hill, NJ 07974 1. Two fundamental questions in coding

More information

Non-isomorphic Distribution Supports for Calculating Entropic Vectors

Non-isomorphic Distribution Supports for Calculating Entropic Vectors Non-isomorphic Distribution Supports for Calculating Entropic Vectors Yunshu Liu & John MacLaren Walsh Adaptive Signal Processing and Information Theory Research Group Department of Electrical and Computer

More information

Message Encoding and Retrieval for Spread and Cyclic Orbit Codes

Message Encoding and Retrieval for Spread and Cyclic Orbit Codes Message Encoding and Retrieval for Spread and Cyclic Orbit Codes Anna-Lena Trautmann, Member, IEEE Department of Electrical and Electronic Engineering University of Melbourne, Australia Department of Electrical

More information

THE MAXIMUM SIZE OF A PARTIAL 3-SPREAD IN A FINITE VECTOR SPACE OVER GF (2)

THE MAXIMUM SIZE OF A PARTIAL 3-SPREAD IN A FINITE VECTOR SPACE OVER GF (2) THE MAXIMUM SIZE OF A PARTIAL 3-SPREAD IN A FINITE VECTOR SPACE OVER GF (2) S. EL-ZANATI, H. JORDON, G. SEELINGER, P. SISSOKHO, AND L. SPENCE 4520 MATHEMATICS DEPARTMENT ILLINOIS STATE UNIVERSITY NORMAL,

More information

Index coding with side information

Index coding with side information Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated

More information

Combinatorics of p-ary Bent Functions

Combinatorics of p-ary Bent Functions Combinatorics of p-ary Bent Functions MIDN 1/C Steven Walsh United States Naval Academy 25 April 2014 Objectives Introduction/Motivation Definitions Important Theorems Main Results: Connecting Bent Functions

More information

Recent progress on Frobenius graphs and related topics

Recent progress on Frobenius graphs and related topics Recent progress on Frobenius graphs and related topics Sanming Zhou Department of Mathematics and Statistics The University of Melbourne Australia sanming@unimelb.edu.au IWONT 2011, Brussels Motivation

More information

6.046 Recitation 11 Handout

6.046 Recitation 11 Handout 6.046 Recitation 11 Handout May 2, 2008 1 Max Flow as a Linear Program As a reminder, a linear program is a problem that can be written as that of fulfilling an objective function and a set of constraints

More information

arxiv: v1 [cs.it] 18 Jan 2012

arxiv: v1 [cs.it] 18 Jan 2012 Noname manuscript No. (will be inserted by the editor) A Complete Characterization of Irreducible Cyclic Orbit Codes and their Plücker Embedding Joachim Rosenthal Anna-Lena Trautmann arxiv:1201.3825v1

More information

Square 2-designs/1. 1 Definition

Square 2-designs/1. 1 Definition Square 2-designs Square 2-designs are variously known as symmetric designs, symmetric BIBDs, and projective designs. The definition does not imply any symmetry of the design, and the term projective designs,

More information

Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach

Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach ALPHABET SIZE REDUCTION FOR SECURE NETWORK CODING: A GRAPH THEORETIC APPROACH 1 Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach Xuan Guang, Member, IEEE, and Raymond W. Yeung,

More information

Tactical Decompositions of Steiner Systems and Orbits of Projective Groups

Tactical Decompositions of Steiner Systems and Orbits of Projective Groups Journal of Algebraic Combinatorics 12 (2000), 123 130 c 2000 Kluwer Academic Publishers. Manufactured in The Netherlands. Tactical Decompositions of Steiner Systems and Orbits of Projective Groups KELDON

More information

The Capacity of a Network

The Capacity of a Network The Capacity of a Network April Rasala Lehman MIT Collaborators: Nick Harvey and Robert Kleinberg MIT What is the Capacity of a Network? Source a Source b c d e Sink f Sink What is the Capacity of a Network?

More information

Coding for Errors and Erasures in Random Network Coding

Coding for Errors and Erasures in Random Network Coding Coding for Errors and Erasures in Random Network Coding arxiv:cs/0703061v2 [cs.it] 25 Mar 2008 Ralf Kötter Institute for Communications Engineering TU Munich D-80333 Munich ralf.koetter@tum.de Frank R.

More information

An Ins t Ins an t t an Primer

An Ins t Ins an t t an Primer An Instant Primer Links from Course Web Page Network Coding: An Instant Primer Fragouli, Boudec, and Widmer. Network Coding an Introduction Koetter and Medard On Randomized Network Coding Ho, Medard, Shi,

More information

Difference sets and Hadamard matrices

Difference sets and Hadamard matrices Difference sets and Hadamard matrices Padraig Ó Catháin University of Queensland 5 November 2012 Outline 1 Hadamard matrices 2 Symmetric designs 3 Hadamard matrices and difference sets 4 Two-transitivity

More information

Combinatorial Group Testing for DNA Library Screening

Combinatorial Group Testing for DNA Library Screening 0-0 Combinatorial Group Testing for DNA Library Screening Ying Miao University of Tsukuba 0-1 Contents 1. Introduction 2. An Example 3. General Case 4. Consecutive Positives Case 5. Bayesian Network Pool

More information

Orthogonal Arrays & Codes

Orthogonal Arrays & Codes Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible

More information

An algebraic proof of the Erdős-Ko-Rado theorem for intersecting families of perfect matchings

An algebraic proof of the Erdős-Ko-Rado theorem for intersecting families of perfect matchings Also available at http://amc-journal.eu ISSN 855-3966 (printed edn.), ISSN 855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 2 (207) 205 27 An algebraic proof of the Erdős-Ko-Rado theorem for intersecting

More information

Multi-coloring and Mycielski s construction

Multi-coloring and Mycielski s construction Multi-coloring and Mycielski s construction Tim Meagher Fall 2010 Abstract We consider a number of related results taken from two papers one by W. Lin [1], and the other D. C. Fisher[2]. These articles

More information

On Perfect Codes and Related Concepts

On Perfect Codes and Related Concepts Designs, Codes and Cryptography, 22, 221 237, 2001. c 2001 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. On Perfect Codes and Related Concepts R. AHLSWEDE H.K. AYDINIAN L.H. KHACHATRIAN

More information

Sunflowers and Primitive SCIDs

Sunflowers and Primitive SCIDs (joint work with R.D. Barrolleta, L. Storme and E. Suárez-Canedo) July 15, 2016 (joint work with R.D. Barrolleta, L. Storme and E. Suárez-Canedo) Definitions Background 1 Definitions Background 2 Subspace

More information

Broadcasting With Side Information

Broadcasting With Side Information Department of Electrical and Computer Engineering Texas A&M Noga Alon, Avinatan Hasidim, Eyal Lubetzky, Uri Stav, Amit Weinstein, FOCS2008 Outline I shall avoid rigorous math and terminologies and be more

More information

On certain Regular Maps with Automorphism group PSL(2, p) Martin Downs

On certain Regular Maps with Automorphism group PSL(2, p) Martin Downs BULLETIN OF THE GREEK MATHEMATICAL SOCIETY Volume 53, 2007 (59 67) On certain Regular Maps with Automorphism group PSL(2, p) Martin Downs Received 18/04/2007 Accepted 03/10/2007 Abstract Let p be any prime

More information

Root systems and optimal block designs

Root systems and optimal block designs Root systems and optimal block designs Peter J. Cameron School of Mathematical Sciences Queen Mary, University of London Mile End Road London E1 4NS, UK p.j.cameron@qmul.ac.uk Abstract Motivated by a question

More information

CS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018

CS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018 CS 580: Algorithm Design and Analysis Jeremiah Blocki Purdue University Spring 2018 Recap Network Flow Problems Max-Flow Min Cut Theorem Ford Fulkerson Augmenting Paths Residual Flow Graph Integral Solutions

More information

The Intersection Problem for Steiner Triple Systems. Bradley Fain

The Intersection Problem for Steiner Triple Systems. Bradley Fain The Intersection Problem for Steiner Triple Systems by Bradley Fain A thesis submitted to the Graduate Faculty of Auburn University in partial fulfillment of the requirements for the Degree of Master of

More information

Preliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}

Preliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)

More information

Codes on graphs and iterative decoding

Codes on graphs and iterative decoding Codes on graphs and iterative decoding Bane Vasić Error Correction Coding Laboratory University of Arizona Prelude Information transmission 0 0 0 0 0 0 Channel Information transmission signal 0 0 threshold

More information

Combinatorial optimization problems

Combinatorial optimization problems Combinatorial optimization problems Heuristic Algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Optimization In general an optimization problem can be formulated as:

More information

A Singleton Bound for Lattice Schemes

A Singleton Bound for Lattice Schemes 1 A Singleton Bound for Lattice Schemes Srikanth B. Pai, B. Sundar Rajan, Fellow, IEEE Abstract arxiv:1301.6456v4 [cs.it] 16 Jun 2015 In this paper, we derive a Singleton bound for lattice schemes and

More information

THE NUMBER OF INVARIANT SUBSPACES UNDER A LINEAR OPERATOR ON FINITE VECTOR SPACES

THE NUMBER OF INVARIANT SUBSPACES UNDER A LINEAR OPERATOR ON FINITE VECTOR SPACES Advances in Mathematics of Communications Volume 5, No. 2, 2011, 407 416 Web site: http://www.aimsciences.org THE NUMBER OF INVARIANT SUBSPACES UNDER A LINEAR OPERATOR ON FINITE VECTOR SPACES This work

More information

Extending MDS Codes. T. L. Alderson

Extending MDS Codes. T. L. Alderson Extending MDS Codes T. L. Alderson Abstract A q-ary (n,k)-mds code, linear or not, satisfies n q + k 1. A code meeting this bound is said to have maximum length. Using purely combinatorial methods we show

More information

STRONG FORMS OF ORTHOGONALITY FOR SETS OF HYPERCUBES

STRONG FORMS OF ORTHOGONALITY FOR SETS OF HYPERCUBES The Pennsylvania State University The Graduate School Department of Mathematics STRONG FORMS OF ORTHOGONALITY FOR SETS OF HYPERCUBES A Dissertation in Mathematics by John T. Ethier c 008 John T. Ethier

More information

The cycle polynomial of a permutation group

The cycle polynomial of a permutation group The cycle polynomial of a permutation group Peter J. Cameron School of Mathematics and Statistics University of St Andrews North Haugh St Andrews, Fife, U.K. pjc0@st-andrews.ac.uk Jason Semeraro Department

More information

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane 2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and

More information

Hadamard matrices, difference sets and doubly transitive permutation groups

Hadamard matrices, difference sets and doubly transitive permutation groups Hadamard matrices, difference sets and doubly transitive permutation groups Padraig Ó Catháin University of Queensland 13 November 2012 Outline 1 Hadamard matrices 2 Symmetric designs 3 Hadamard matrices

More information

The existence of designs - after Peter Keevash

The existence of designs - after Peter Keevash The existence of designs - after Peter Keevash Bourbaki seminar, IHP, Paris, June 27, 2015 Introduction: Designs and Steiner systems A set S of q-subsets of an n-set X is a design with parameters (n, q,

More information

Classification of Directed and Hybrid Triple Systems

Classification of Directed and Hybrid Triple Systems BAYREUTHER MATHEMATISCHE SCHRIFTEN 74 (2005), 276-291 Classification of Directed and Hybrid Triple Systems Patric R. J. Östergård and Olli Pottonen Abstract Pairwise nonisomorphic directed and hybrid triple

More information

Strongly Regular Decompositions of the Complete Graph

Strongly Regular Decompositions of the Complete Graph Journal of Algebraic Combinatorics, 17, 181 201, 2003 c 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Strongly Regular Decompositions of the Complete Graph EDWIN R. VAN DAM Edwin.vanDam@uvt.nl

More information

On Extremal Codes With Automorphisms

On Extremal Codes With Automorphisms On Extremal Codes With Automorphisms Anton Malevich Magdeburg, 20 April 2010 joint work with S. Bouyuklieva and W. Willems 1/ 33 1. Linear codes 2. Self-dual and extremal codes 3. Quadratic residue codes

More information

On m ovoids of W 3 (q)

On m ovoids of W 3 (q) On m ovoids of W 3 (q) A. Cossidente, C. Culbert, G. L. Ebert, and G. Marino Abstract We show that the generalized quadrangle W 3 (q) for odd q has exponentially many 1 (q+1) ovoids, thus implying that

More information

Agenda. Soviet Rail Network, We ve done Greedy Method Divide and Conquer Dynamic Programming

Agenda. Soviet Rail Network, We ve done Greedy Method Divide and Conquer Dynamic Programming Agenda We ve done Greedy Method Divide and Conquer Dynamic Programming Now Flow Networks, Max-flow Min-cut and Applications c Hung Q. Ngo (SUNY at Buffalo) CSE 531 Algorithm Analysis and Design 1 / 52

More information

A short course on matching theory, ECNU Shanghai, July 2011.

A short course on matching theory, ECNU Shanghai, July 2011. A short course on matching theory, ECNU Shanghai, July 2011. Sergey Norin LECTURE 3 Tight cuts, bricks and braces. 3.1. Outline of Lecture Ear decomposition of bipartite graphs. Tight cut decomposition.

More information

Regular and synchronizing transformation monoids

Regular and synchronizing transformation monoids Regular and synchronizing transformation monoids Peter J. Cameron NBSAN, York 23 November 2011 Mathematics may be defined as the subject in which we never know what we are talking about, nor whether what

More information

Finite Mathematics. Nik Ruškuc and Colva M. Roney-Dougal

Finite Mathematics. Nik Ruškuc and Colva M. Roney-Dougal Finite Mathematics Nik Ruškuc and Colva M. Roney-Dougal September 19, 2011 Contents 1 Introduction 3 1 About the course............................. 3 2 A review of some algebraic structures.................

More information

Incidence Structures Related to Difference Sets and Their Applications

Incidence Structures Related to Difference Sets and Their Applications aòµ 05B30 ü èµ Æ Òµ 113350 Æ Æ Ø Ø K8: 'u8'é(9ùa^ = Ø K8: Incidence Structures Related to Difference Sets and Their Applications úôœææ Æ Ø ž

More information

LET F q be the finite field of size q. For two k l matrices

LET F q be the finite field of size q. For two k l matrices 1 Codes and Designs Related to Lifted MRD Codes Tuvi Etzion, Fellow, IEEE and Natalia Silberstein arxiv:1102.2593v5 [cs.it 17 ug 2012 bstract Lifted maximum ran distance (MRD) codes, which are constant

More information

Triply even codes binary codes, lattices and framed vertex operator algebras

Triply even codes binary codes, lattices and framed vertex operator algebras Triply even codes binary codes, lattices and framed vertex operator algebras Akihiro Munemasa 1 1 Graduate School of Information Sciences Tohoku University (joint work with Koichi Betsumiya, Masaaki Harada

More information

Strongly regular graphs and substructures of finite classical polar spaces

Strongly regular graphs and substructures of finite classical polar spaces Strongly regular graphs and substructures of finite classical polar spaces Jan De Beule Department of Mathematics Ghent University June 25th, 2015 8th Slovenian International Conference on Graph Theory

More information

A METHOD FOR CLASSIFICATION OF DOUBLY RESOLVABLE DESIGNS AND ITS APPLICATION. Stela Zhelezova

A METHOD FOR CLASSIFICATION OF DOUBLY RESOLVABLE DESIGNS AND ITS APPLICATION. Stela Zhelezova Serdica J. Computing 5 (2011), 273 308 A METHOD FOR CLASSIFICATION OF DOUBLY RESOLVABLE DESIGNS AND ITS APPLICATION Stela Zhelezova Abstract. The resolvability of combinatorial designs is intensively investigated

More information

q xk y n k. , provided k < n. (This does not hold for k n.) Give a combinatorial proof of this recurrence by means of a bijective transformation.

q xk y n k. , provided k < n. (This does not hold for k n.) Give a combinatorial proof of this recurrence by means of a bijective transformation. Math 880 Alternative Challenge Problems Fall 2016 A1. Given, n 1, show that: m1 m 2 m = ( ) n+ 1 2 1, where the sum ranges over all positive integer solutions (m 1,..., m ) of m 1 + + m = n. Give both

More information

A Short Overview of Orthogonal Arrays

A Short Overview of Orthogonal Arrays A Short Overview of Orthogonal Arrays John Stufken Department of Statistics University of Georgia Isaac Newton Institute September 5, 2011 John Stufken (University of Georgia) Orthogonal Arrays September

More information

On non-antipodal binary completely regular codes

On non-antipodal binary completely regular codes On non-antipodal binary completely regular codes J. Borges, J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, 08193-Bellaterra, Spain. V.A. Zinoviev Institute

More information

SOME QUESTIONS ARISING FROM THE STUDY OF THE GENERATING GRAPH

SOME QUESTIONS ARISING FROM THE STUDY OF THE GENERATING GRAPH SOME QUESTIONS ARISING FROM THE STUDY OF Andrea Lucchini Università di Padova, Italy ISCHIA GROUP THEORY 2012 March, 26th - 29th The generating graph Γ(G) of a group G is the graph defined on the non-identity

More information

Orbitopes. Marc Pfetsch. joint work with Volker Kaibel. Zuse Institute Berlin

Orbitopes. Marc Pfetsch. joint work with Volker Kaibel. Zuse Institute Berlin Orbitopes Marc Pfetsch joint work with Volker Kaibel Zuse Institute Berlin What this talk is about We introduce orbitopes. A polyhedral way to break symmetries in integer programs. Introduction 2 Orbitopes

More information

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet

More information

Combinatorial properties of transformation monoids

Combinatorial properties of transformation monoids Combinatorial properties of transformation monoids Peter J. Cameron 35ACCMCC Melbourne, December 2011 A few combinatorial problems... Is there an analogue of Baranyai s Theorem over fields with more than

More information

Hamming Codes 11/17/04

Hamming Codes 11/17/04 Hamming Codes 11/17/04 History In the late 1940 s Richard Hamming recognized that the further evolution of computers required greater reliability, in particular the ability to not only detect errors, but

More information

Difference sets and Hadamard matrices

Difference sets and Hadamard matrices Difference sets and Hadamard matrices Padraig Ó Catháin National University of Ireland, Galway 14 March 2012 Outline 1 (Finite) Projective planes 2 Symmetric Designs 3 Difference sets 4 Doubly transitive

More information

On small minimal blocking sets in classical generalized quadrangles

On small minimal blocking sets in classical generalized quadrangles On small minimal blocking sets in classical generalized quadrangles Miroslava Cimráková a Jan De Beule b Veerle Fack a, a Research Group on Combinatorial Algorithms and Algorithmic Graph Theory, Department

More information