Linear programming bounds for. codes of small size. Ilia Krasikov. Tel-Aviv University. School of Mathematical Sciences,

Size: px
Start display at page:

Download "Linear programming bounds for. codes of small size. Ilia Krasikov. Tel-Aviv University. School of Mathematical Sciences,"

Transcription

1 Linear programming bounds for codes of small size Ilia Krasikov Tel-Aviv University School of Mathematical Sciences, Ramat-Aviv Tel-Aviv, Israel and Beit-Berl College, Kfar-Sava, Israel Simon Litsyn Tel-Aviv University Department of Electrical Engineering { Systems Ramat-Aviv Tel-Aviv, Israel

2 Running head: Bounds for codes Mailing address: S.Litsyn, Department of Electrical Engineering - Systems, Tel-Aviv University, Ramat-Aviv Israel; tel.(973) (h), (973) (oce), (973) (fax); litsyn@eng.tau.ac.il Home page: litsyn

3 Abstract Combining linear programming approach with the Plotkin-Johnson argument for constant weight codes, we derive upper bounds on the size of codes of length n and minimum distance d = (n 0 j)=, 0 < j < n 1=3. For j = o(n 1=3 ) these bounds practically coincide (are slightly better) with the Tietavainen bound. For xed j and j proportional to n 1=3, j < n 1=3 0 (=9) ln n, it improves on the earlier known results. Keywords: Upper bounds, Plotkin bound, Tietavainen bound, McEliece bound. 3

4 1 Introduction Let C be a binary (n; M; d) code of length n, size M, and minimum distance d = (n0j)=. Let B = (B 0 ; B 1 ;... ; B n ) stand for its distance distribution. For every c C dene the relative weight distribution A(c) = (A 0 (c);... ; A n (c)) w.r.t. c, where A i (c) denotes the number of codewords of C being at distance i from c. So, B i = 1 M X cc A i (c): The MacWilliams transform of B is B 0 k = 1 M i=0 B i P k (i); and in every code B 0 = B 0 0 = 1, B 0 k 0 [3]. The tight bounds (provided existence of Hadamard matrices of all sizes divisible by 4) due to Plotkin and Levenshtein describe the best parameters of codes with j 0, and also j = 1, n = 3 mod 4 (see, e.g. [8, x.,.3]). Even in the case j = 1, n = 1 mod 4, the exact value of the maximum possible size of code is still unknown. In what follows, we deal with the case j > 0. In 1973 R.J.McEliece (unpublished, see [8, Theorem 38,Chapter 17]), using the linear programming approach has established the bound M < M ME := n(j + ); (1) valid for j = o( p n ). I.Honkala and A.Tietavainen [4] have constructed codes with parameters n = ( 4m 0 1)=( m + 1), j = m 0 1 and M = 4m, thus demonstrating that for j n 1=3 the McEliece bound is of the correct order of magnitude. We are not aware of any other general construction of codes with n 1=3 < j = o( p n), of size close to the McEliece bound. A. Tietavainen [16] developed an ingenious approach, resulting in an essential improvement on (1) for j = o(n 1=3 ). Namely, for xed j and for j growing with n, j = o(n 1=3 ), M < M T := (5 0 p + ln(j + 1))n; () n ln j M < MT 0 := (1 + o(1)): (3) Actually, the method of A.Tietavainen still yields meaningful results while j < n 1=3. 4

5 It is known [6, 1] that the direct use of the linear programming cannot lead to a better bound than that of McEliece. So, to progress one should use some extra ineualities. Here we will show that new ineualities naturally arise in the context of the Plotkin- Johnson arguments being used for estimating the size of codes in a Hamming ball. It turns out that this yields, for a wide class of polynomials (x), an upper bound on P ni=a (i)b i, where a > (n + p jn )=. On the other hand, the linear programming gives ineuality P n i=0 (i)b i M 0, where 0 = P 0n n n k=0 (k), whenever (x) has positive k coecients in its Krawtchouk expansion. Combining these two ineualities allows getting upper bounds on M. Here we apply this idea to specially chosen polynomials of second degree, and obtain bounds on the size of codes with j < n 1=3. The main result is as follows. Theorem 1 Size M of codes of length n and of minimum distance d = (n 0 j)=, 0 < j < n 1=3, is upperbounded as follows: i) j is xed, where " satises M < n (j ln( j 0 1) + 5j + 6") " + o(n); 4(1 0 ")j " (j ln(j 0 ") 0 j ln " + 5j + 6) ii) j is growing with n, n > j 3 ( ln j + 1), +"j(j ln " 0 j ln(j 0 ") 0 7j 0 6) + j = 0: M < n ln j( ln j + ln ln j + 5) 4(ln j 0 1) n ln j : + o(n) iii) j is growing with n, j 3 < n < j 3 ( ln j + 1), M < c n c (c 0 1) ln j (ln j + ln j ln ln j + ln ln j 0 c ln(c 0 1) + o(ln j ln ln j)) c 0 1 where c = p n j 03=. cn ln j c01 (c 0 1) ; 5

6 For xed j, the theorem gives M < const n with a better constant (depending only on j) then that in the Tietavainen bound M T (see Table 1 for the explicit values for rst few j's). Still, those constants can be further improved at the expense of more accurate calculations. For j = o(n 1=3 ), growing in n, our bound, although slightly better, practically coincides with MT 0. In view of the construction of Honkala and Tietavainen there is no hope to amend M ME for j n 1=3. Nevertheless, for j < n 1=3 0 ln n, our result still surpass the 9 McEliece bound. In the proof we use linear programming with polynomials of second degree. Analogous machinery can be applied to polynomials of higher degrees. Apparently, it can lead to an improvement on the Levenshtein bounds [6], see also []. The Tietavainen bound was generalized to the case of nonbinary [10], constant weight [15], Lee [15], and spherical [1] codes. Clearly our results can be expanded also to these situations. Everywhere in the paper we assume n to be suciently large to justify all approximations. Ineualities We start with the auxiliary lemma which employs the well known Johnson-Plotkin argument usually being used for constant weight codes. However, and it is crucial for our purposes, the same arguments are valid as well for estimating the maximal size of a code of given distance within (or outside) a Hamming sphere. We present here the sought modication of the standard proof for this situation (see also [9]). Lemma 1 For every c C, ( i=x and, if x > (n + p jn )=, (i 0 n)a i (c)) nm c (x)((m c (x) 0 1)j + n); (4) m c (x) = i=x A i (c) dn x 0 nx + dn : (5) Proof. Fix c C. Consider the matrix V 6 consisting of the codewords being at distance at least x from c with zeros replaced by (01)'s. The number of its rows is precisely m = m c (x) = P n i=x A i (c). 6

7 Let v 1 ;... ; v m ; stand for the rows of V 6, while u 1 ;... ; u n, being its columns. Denote also by s i the number of 1's in the i-th column, and by s the average number of 1's in column, s = 1 s i = 1 n n i=1 k=x ka k (c): (6) The usual scalar product of any two distinct rows is at least n 0 d = j, therefore S = mx mx i=1 k=1 On the other hand, by Jensen ineuality, (v i ; v k ) m(m 0 1)j + mn: So, S = i=1 s i + (m 0 s i ) 0 s i (m 0 s i ) = i=1 (s i 0 m) n(s 0 m) : n(s 0 m) m(m 0 1)j + mn; that is euivalent to (4). Finally, since s xm=n, solving the ineuality we get (5) provided x > (n + p jn )=. We need the following elementary technical lemma. Lemma The maximum in z, z > 0, of the function u(z) = nz((z 0 1)j + n) 0 wz; euals (n 0 j)(w 0 p w 0 jn) ; j provided w p jn, and u(z) is increasing in z if jwj < p jn. Proof. We have u 0 (z) = n(n 0 j + jz) nz(n 0 j + jz) 0 w; (n 0 j) nz(n 0 j + jz) u 00 (z) = 0 < 0: 4z (n 0 j + jz) 7

8 For jwj < p jn we have u 0 (z) > 0. For w p jn, the maximum is achieved at z = (n 0 j)(w 0 p w 0 jn) j p : w 0 jn Here follows the theorem presenting the key ineuality. Theorem Let x (n + r)=, r > p jn, then 8 >< >: where y = x 0 n 0 r+j. i=x n(n0j)(r+j) 4((x0n) 0jn) n0j 4j (y 0 p y 0 jn) (i 0 x + r + j 4 )B i g(x) := n 0 x + r+j 4 if 4x > 3n + j if (n + r) < 4x < n + r + j + p jn if n + r + j + p jn 4x 3n + j (7) Proof. Let c be a codeword. Observe that for x > n= we have s 0 m = i=x Therefore, using d = (n 0 j)=, from (4) we derive This is euivalent to Adding r+j i=x n(s 0 m) = i=x i=x (i 0 x)a i (c) i n 0 1 A i (c) 0: (i 0 n)a i (c) P ni=x A i (c) = r+j m, we obtain i 0 x + r + j 4 nm((m 0 1)j + n) : nm((m 0 1)j + n) 0 (x 0 n)m: A i (c) nm((m 0 1)j + n) 0 x 0 n 0 r + j m: If 4x n + r + j + p jn, the previous lemma, with w = x 0 n 0 r+j z = m, gives the maximum of the right-hand side in m. p jn and 8

9 If (n+r) < 4x < n+r+j+ p jn, then jwj < p jn, and the maximum of the right-hand side is attained for the maximal possible value of m given by (5). Finally, for x > 3n+j 4, there is at most one codeword of weight being in the range [x; n]. Therefore, for such x, i=x A i (c) i 0 x + r + j 4 max i i 0 x + r + j 4 = n 0 x + r + j 4 : Averaging over all c C we get the claim. Lemma 3 Let (x) be a nonnegative polynomial for all integer x in the interval [(n + r)=; n], r > p jn. Then i=(n+r)= B i ix x=(n+r)= (i 0 x + a) (x) x=(n+r)= g(x) (x): (8) Proof. Multiplying both sides of (7) by (x) and summing over x [(n + r)=; n], we obtain the claim changing the order of summation in the left-hand side. Remark 1 Although, in what follows, we use (x) = 1, for j being greater than n 1=3 one should use polynomial (x) of larger degree. Theorem 3 For r > p jn, y = x 0 n 0 r+j, i=(n+r)= (n + r 0 i 0 )(n 0 j 0 i) B i 8 x=(n+r)= g(x) (9) = 8 >< >: 1 P (3n+j)=4 (n 0 j) j (y 0 p y 0 jn) + (n + j + r) x=(n+r)= + 1 j (n 0 j) n(r + j) P (n+r+j+ p jn )=4 x=(n+r)= 1 (x0n) 0jn P (3n+j)=4 x=(n+r+j+ p jn )=4 (y 0 p y 0 jn) + (n + j + r) for r j + p jn for r < j + p jn Proof. Follows from Theorem and Lemma 3 with (x) = 1. 9

10 In the following lemma we give an ineuality slightly more general than that of the conventional linear programming [3] if one uses polynomials of second degree. Generalization to arbitrary degree is straightforward. Lemma 4 Let f(x) = (x 0 x 1 )(x 0 x ) = a 0 + a 1 P 1 (x) + 1 P (x); where a 0 ; a 1 0, x x 1 d. Then, provided a 0 > f(d), M f(0) + P n i=x f(i)b i : (10) a 0 0 f(d) Proof. From the expression of the MacWilliams transform Ma 0 M(a 0 B a 1B (1=)B0 ) = f(0)b 0 + Xx 1 i=d i=0 f(i)b i + f(i)b i i=x f(0) + Mf(d) + f(i)b i : i=x f(i)b i It is easy to see that if x 1 d and x n, then we get the standard linear programming bound: M f(0)=a 0. Theorem 4 M < inf r( p jn ;+n=j) (n 0 j)(n + r 0 ) + 8 P n x=(n+r)= g(x) : n 0 jr + j Proof. Choose in the previous lemma f(x) = 1 4 (n 0 j 0 x)(n + r 0 x 0 ) = (n 0 jr + j) + (r 0 j 0 )P 1(x) + P (x) : 4 Moreover, x 1 = d, and so f(d) = 0. To have a 0 and a 1 nonnegative along with r > p jn we reuire 10

11 jn < r < n j + : (11) Substituting the chosen f(x) into (10) we get M (n 0 j)(n + r 0 ) + P n x=(n+r)= (n 0 j 0 x)(n + r 0 x 0 )B x n 0 jr + j (n 0 j)(n + r 0 ) + 8 P n x=(n+r)= g(x) : (1) n 0 jr + j 3 Specic bounds To derive an explicit upper bound we optimize in r the ineuality of Theorem 4. It turns out that the main term of the bound is not essentially sensitive to the choice of r. Consider several cases depending on the order of j. Case j is a constant independent on n In this case we choose r = "n=j, for some constant " = "(j) > 0, to be chosen later. Then p jn = o(r), and Using 1 0 p 1 0 z z= 0 z =; g(x) 4x n + r > n + r + j + jn : 8 >< >: z [0; 1]; we get n(n0j) 8y where y = x 0 n 0 r+j. This gives + n(n0j)j 8y 3 for 4x 3n + j n 0 x + r+j 4 for 4x > 3n + j M < (n 0 j)(n + r) + n(n 0 j) P (3n+j)=4 x=(n+r)= (y01 + jy 03 ) + 8 P n x=(3n+j)=4 (n 0 x + r+j ) 4 n 0 jr + j < n 5n + 6r + n ln n0r r 4(n 0 jr) + o(n): 11

12 Table 1: Bounds for j xed j " M=n M T =n M ME =n 1 0: :7585 : : : : : :8887 3: : :4459 3: : : : : : : :185 3: : : :881 4: : :8880 4: : : : : :704 6: To nd the minimum of the right-hand side we determine (uniue) " [0; 1], from the condition: " (j ln(j 0 ") 0 j ln " + 5j + 6) +"j(j ln " 0 j ln(j 0 ") 0 7j 0 6) + j = 0: For rst few j's the resulting upper bound is presented in Table 1 (here M stands for the suggested bound, M T for the Tietavainen bound, and M ME for the McEliece bound). Remark Actually, the Plotkin bound for j = 1 and n = 3 mod 4 yields M n +, and this bound is achieved. For j = 1 and n = 1 mod 4, the upper bound M :7585:::n + o(n), seems to be the best known. The conference-matrix codes in this case give M = n + [13]. Remark 3 For small j, the bound we propose can be further tightened. It can be done if in Lemma 1 we take into account that the number of 1's and (-1)'s in each column is integer (see [5]). For instance, there can be at most four codewords of weight greater than 0:7n + o(n), ve of weight greater than (5=36)n + o(n), etc. Exact calculations reuire a vast amount of computational work, and apparently lead to marginal improvements. Case j is growing, n > j 3 ( ln j + 1) Choose r = n. Then, again, j ln j 1

13 4x n + r > n + r + j + jn ; and proceeding as in the previous case, we get M < n ln j( ln j + ln ln j + 5) 4(ln j 0 1) + o(n): n ln j (1 + o(1)): Case j is growing, j 3 < n < j 3 ( ln j + 1) Let n = c j 3, where 1 < c < ln j + 1. Set r = p jn, where 1 < = 1 + c 0 1 ln j < n + j j p jn : (13) Then M < 1 n 0 jr 1 (n 0 j)(n + r) + n(n 0 j)(r + j) (n+r+j+ X p jn )=4 = 1 n 0 jr (n 0 j) + j +8 (3n+j)=4 X x=(n+r+j+ p jn )=4 (3n+j)=4 (n 0 j) j +8 (3n+j)=4 x=(n+r)= (y 0 1 (n 0 x + r + j 4 ) A (3n+j)=4 X x=(n+r+j+ p jn )=4 (n 0 x + r + j 4 ) y 0 jn) (y 0 1 A 1 (x 0 n) 0 jn y 0 jn) = n 0 j n 0 jr (5n + 6r + I 1 + I ); (14) 13

14 where (n+r+j+ p jn )=4 X 1 I 1 = n(r + j) (x 0 n) 0 jn ; x=(n+r)= I = j (3n+j)=4 X x=(n+r+j+ p jn )=4 (y 0 y 0 jn): We estimate now I 1 and I replacing the sums by integrals. We get I 1 = s n j (j + r) arth r p 0 arth j + r +! p jn jn p + o(n) jn = p n ( p n + j ) 0 arth 0 arth 1 j 1 + n + 11 A A + o(n) = 1 p p ( + 1)( p j + p n ) n ( n + j ) ln ( 0 1)( p j + ( + 4) p n ) + o(n) Similarly, = n ln ( + 1) ( 0 1)( + 4) + o(n): I = 1 8j 1 0 (n 0 r) 0 4jn 0 (n 0 r) (n 0 r) 0 4jn + 4jn ln n 0 r + (n 0 r) 0 4jn p A + o(n) jn = n(4jn 0 (n 0 r) ) 4((n 0 r) 0 3jn) + n (n 0 r) ln + o(n) 4 jn = n 4 ( ln(p n 0 j ) 0 ln j 0 1) + o(n) = n 4 ln n j 0 1! + o(n): 14

15 Now (14) gives M < n 0 j n 0 j p jn 5n + 6 j jn + n ln ( + 1) ( 0 1)( + 4) + n 4 (ln n j 0 1) + o(n)! = n(n 0 j) 4(n 0 jr) ln n j 0 ln ( 0 1)( + 4) ( + 1)! o(1) Substituting from (13) and simplifying we get: M < c(n 0 j) c ln j + ln j ln ln j + ln (c 0 1) ln j c 0 1 ln j 0 c ln(c 0 1) + o(ln j ln ln j) cn ln j c01 (c 0 1) : Notice that this bound is better then the McEliece bound while j < n 1=3 0 9 ln n+o(ln n): 4 Acknowledgement The rst author is thankful to Gerard Cohen for providing hospitality while working on the paper. References [1] J.T.Astola, The Tietavainen bound for spherical codes, Discr. Appl. Math. 7 (1984), 17{1. [] P.Boyvalenkov, preprint (1996). [3] P.Delsarte, An algebraic approach to association schemes of coding theory, Philips Research Rep. Supp., 10 (1973). [4] I.Honkala and A.Tietavainen, Codes and number theory, in: Handbook of Coding Theory, Elsevier, to be published. [5] S.M.Johnson, A new upper bound for error-correcting codes, IRE Trans. Info. Theory, 8 (196), 03{07. 15

16 [6] V. Levenshtein, Krawtchouk polynomials and universal bounds for codes and designs in Hamming spaces, IEEE Trans. Info. Theory, 41 (1995), pp.1303{131. [7] J. H. van Lint, Introduction to Coding Theory, Springer-Verlag, 199. [8] F.J. MacWilliams and N.J.A. Sloane, The Theory of Error-Correcting Codes, New York: North-Holland, [9] R.J. McEliece and H.Rumsey,Jr., Sphere-packing in the Hamming metric, Journal of Combinatorial Theory, Ser.A (1973), 3{34. [10] A.Perttula, Bounds for binary and nonbinary codes slightly outside of the Plotkin range, Tampere Univeristy of Technology Publ., 14 (198). [11] M.Plotkin, Binary codes with specied minimum distance, IRE Trans. Info. Theory, 6 (1960), 445{450. [1] V.M.Sidel'nikov, On extremal polynomials used to estimate the size of codes, Probl. Inform. Transmission, 16 (1980), 174{186. [13] N.J.A.Sloane and J.J.Seidel, A new family of nonlinear codes obtained from conference matrices, Annals N.Y. Acad. Sci., 175 (1970), 363{365. [14] G. Szego, Orthogonal Polynomials, Amer. Math. Soc. Collo. Publ., vol.3, Providence, RI, [15] H.Tarnanen, Upper bounds for constant weight and Lee codes slightly outside the Plotkin range, Discrete Applied Mathematics, 16 (1987), 65{77. [16] A.Tietavainen, Bounds for binary codes just outside the Plotkin range, Information and Control, 47 (1980), 85{93. 16

Improved Upper Bounds on Sizes of Codes

Improved Upper Bounds on Sizes of Codes 880 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 4, APRIL 2002 Improved Upper Bounds on Sizes of Codes Beniamin Mounits, Tuvi Etzion, Senior Member, IEEE, and Simon Litsyn, Senior Member, IEEE

More information

Laura Chihara* and Dennis Stanton**

Laura Chihara* and Dennis Stanton** ZEROS OF GENERALIZED KRAWTCHOUK POLYNOMIALS Laura Chihara* and Dennis Stanton** Abstract. The zeros of generalized Krawtchouk polynomials are studied. Some interlacing theorems for the zeros are given.

More information

A Combinatorial Bound on the List Size

A Combinatorial Bound on the List Size 1 A Combinatorial Bound on the List Size Yuval Cassuto and Jehoshua Bruck California Institute of Technology Electrical Engineering Department MC 136-93 Pasadena, CA 9115, U.S.A. E-mail: {ycassuto,bruck}@paradise.caltech.edu

More information

Elementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q),

Elementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q), Elementary 2-Group Character Codes Cunsheng Ding 1, David Kohel 2, and San Ling Abstract In this correspondence we describe a class of codes over GF (q), where q is a power of an odd prime. These codes

More information

Moments of orthogonal arrays

Moments of orthogonal arrays Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory Moments of orthogonal arrays Peter Boyvalenkov, Hristina Kulina Pomorie, BULGARIA, June 15-21, 2012 Orthogonal arrays H(n,

More information

Estimates of the Distance Distribution of Codes and Designs

Estimates of the Distance Distribution of Codes and Designs 1050 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 Estimates of the Distance Distribution of Codes Designs Alexei Ashikhmin, Member, IEEE, Alexer Barg, Senior Member, IEEE, Simon

More information

Generalized hashing and applications to digital fingerprinting

Generalized hashing and applications to digital fingerprinting Generalized hashing and applications to digital fingerprinting Noga Alon, Gérard Cohen, Michael Krivelevich and Simon Litsyn Abstract Let C be a code of length n over an alphabet of q letters. An n-word

More information

Skew Cyclic Codes Of Arbitrary Length

Skew Cyclic Codes Of Arbitrary Length Skew Cyclic Codes Of Arbitrary Length Irfan Siap Department of Mathematics, Adıyaman University, Adıyaman, TURKEY, isiap@adiyaman.edu.tr Taher Abualrub Department of Mathematics and Statistics, American

More information

ON LINEAR CODES WHOSE WEIGHTS AND LENGTH HAVE A COMMON DIVISOR. 1. Introduction

ON LINEAR CODES WHOSE WEIGHTS AND LENGTH HAVE A COMMON DIVISOR. 1. Introduction ON LINEAR CODES WHOSE WEIGHTS AND LENGTH HAVE A COMMON DIVISOR SIMEON BALL, AART BLOKHUIS, ANDRÁS GÁCS, PETER SZIKLAI, AND ZSUZSA WEINER Abstract. In this paper we prove that a set of points (in a projective

More information

ON THE COMPLEXITY OF SOLVING THE GENERALIZED SET PACKING PROBLEM APPROXIMATELY. Nimrod Megiddoy

ON THE COMPLEXITY OF SOLVING THE GENERALIZED SET PACKING PROBLEM APPROXIMATELY. Nimrod Megiddoy ON THE COMPLEXITY OF SOLVING THE GENERALIZED SET PACKING PROBLEM APPROXIMATELY Nimrod Megiddoy Abstract. The generalized set packing problem (GSP ) is as follows. Given a family F of subsets of M = f mg

More information

Coins with arbitrary weights. Abstract. Given a set of m coins out of a collection of coins of k unknown distinct weights, we wish to

Coins with arbitrary weights. Abstract. Given a set of m coins out of a collection of coins of k unknown distinct weights, we wish to Coins with arbitrary weights Noga Alon Dmitry N. Kozlov y Abstract Given a set of m coins out of a collection of coins of k unknown distinct weights, we wish to decide if all the m given coins have the

More information

Lower bound of the covering radius of binary irreducible Goppa codes

Lower bound of the covering radius of binary irreducible Goppa codes Lower bound of the covering radius of binary irreducible Goppa codes Sergey Bezzateev, Natalia Shekhunova To cite this version: Sergey Bezzateev, Natalia Shekhunova. Lower bound of the covering radius

More information

On binary constructions of quantum codes

On binary constructions of quantum codes arxiv:quant-ph/981065v1 Dec 1998 On binary constructions of quantum codes Gérard Cohen, Sylvia Encheva, Simon Litsyn Abstract We improve estimates on the parameters of quantum codes obtained by Steane

More information

Alternant and BCH codes over certain rings

Alternant and BCH codes over certain rings Computational and Applied Mathematics Vol. 22, N. 2, pp. 233 247, 2003 Copyright 2003 SBMAC Alternant and BCH codes over certain rings A.A. ANDRADE 1, J.C. INTERLANDO 1 and R. PALAZZO JR. 2 1 Department

More information

Constrained Leja points and the numerical solution of the constrained energy problem

Constrained Leja points and the numerical solution of the constrained energy problem Journal of Computational and Applied Mathematics 131 (2001) 427 444 www.elsevier.nl/locate/cam Constrained Leja points and the numerical solution of the constrained energy problem Dan I. Coroian, Peter

More information

APPENDIX A. Background Mathematics. A.1 Linear Algebra. Vector algebra. Let x denote the n-dimensional column vector with components x 1 x 2.

APPENDIX A. Background Mathematics. A.1 Linear Algebra. Vector algebra. Let x denote the n-dimensional column vector with components x 1 x 2. APPENDIX A Background Mathematics A. Linear Algebra A.. Vector algebra Let x denote the n-dimensional column vector with components 0 x x 2 B C @. A x n Definition 6 (scalar product). The scalar product

More information

Type I Codes over GF(4)

Type I Codes over GF(4) Type I Codes over GF(4) Hyun Kwang Kim San 31, Hyoja Dong Department of Mathematics Pohang University of Science and Technology Pohang, 790-784, Korea e-mail: hkkim@postech.ac.kr Dae Kyu Kim School of

More information

n=0 xn /n!. That is almost what we have here; the difference is that the denominator is (n + 1)! in stead of n!. So we have x n+1 n=0

n=0 xn /n!. That is almost what we have here; the difference is that the denominator is (n + 1)! in stead of n!. So we have x n+1 n=0 DISCRETE MATHEMATICS HOMEWORK 8 SOL Undergraduate Course Chukechen Honors College Zhejiang University Fall-Winter 204 HOMEWORK 8 P496 6. Find a closed form for the generating function for the sequence

More information

Some Nonregular Designs From the Nordstrom and Robinson Code and Their Statistical Properties

Some Nonregular Designs From the Nordstrom and Robinson Code and Their Statistical Properties Some Nonregular Designs From the Nordstrom and Robinson Code and Their Statistical Properties HONGQUAN XU Department of Statistics, University of California, Los Angeles, CA 90095-1554, U.S.A. (hqxu@stat.ucla.edu)

More information

Construction ofnew extremal self-dual codes

Construction ofnew extremal self-dual codes Discrete Mathematics 263 (2003) 81 91 www.elsevier.com/locate/disc Construction ofnew extremal self-dual codes T. Aaron Gulliver a;, Masaaki Harada b, Jon-Lark Kim c a Department of Electrical and Computer

More information

Formula for the inverse matrix. Cramer s rule. Review: 3 3 determinants can be computed expanding by any row or column

Formula for the inverse matrix. Cramer s rule. Review: 3 3 determinants can be computed expanding by any row or column Math 20F Linear Algebra Lecture 18 1 Determinants, n n Review: The 3 3 case Slide 1 Determinants n n (Expansions by rows and columns Relation with Gauss elimination matrices: Properties) Formula for the

More information

Primary Decompositions of Powers of Ideals. Irena Swanson

Primary Decompositions of Powers of Ideals. Irena Swanson Primary Decompositions of Powers of Ideals Irena Swanson 2 Department of Mathematics, University of Michigan Ann Arbor, Michigan 48109-1003, USA iswanson@math.lsa.umich.edu 1 Abstract Let R be a Noetherian

More information

Nonlinear Codes Outperform the Best Linear Codes on the Binary Erasure Channel

Nonlinear Codes Outperform the Best Linear Codes on the Binary Erasure Channel Nonear odes Outperform the Best Linear odes on the Binary Erasure hannel Po-Ning hen, Hsuan-Yin Lin Department of Electrical and omputer Engineering National hiao-tung University NTU Hsinchu, Taiwan poning@faculty.nctu.edu.tw,.hsuanyin@ieee.org

More information

Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes

Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Nuh Aydin and Tsvetan Asamov Department of Mathematics Kenyon College Gambier, OH 43022 {aydinn,asamovt}@kenyon.edu

More information

Chapter 7 Reed Solomon Codes and Binary Transmission

Chapter 7 Reed Solomon Codes and Binary Transmission Chapter 7 Reed Solomon Codes and Binary Transmission 7.1 Introduction Reed Solomon codes named after Reed and Solomon [9] following their publication in 1960 have been used together with hard decision

More information

Arithmetic properties of lacunary sums of binomial coefficients

Arithmetic properties of lacunary sums of binomial coefficients Arithmetic properties of lacunary sums of binomial coefficients Tamás Mathematics Department Occidental College 29th Journées Arithmétiques JA2015, July 6-10, 2015 Arithmetic properties of lacunary sums

More information

4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE

4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE 4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER 2008 List Decoding of Biorthogonal Codes the Hadamard Transform With Linear Complexity Ilya Dumer, Fellow, IEEE, Grigory Kabatiansky,

More information

An example of a convex body without symmetric projections.

An example of a convex body without symmetric projections. An example of a convex body without symmetric projections. E. D. Gluskin A. E. Litvak N. Tomczak-Jaegermann Abstract Many crucial results of the asymptotic theory of symmetric convex bodies were extended

More information

1 Introduction A one-dimensional burst error of length t is a set of errors that are conned to t consecutive locations [14]. In this paper, we general

1 Introduction A one-dimensional burst error of length t is a set of errors that are conned to t consecutive locations [14]. In this paper, we general Interleaving Schemes for Multidimensional Cluster Errors Mario Blaum IBM Research Division 650 Harry Road San Jose, CA 9510, USA blaum@almaden.ibm.com Jehoshua Bruck California Institute of Technology

More information

Spurious Chaotic Solutions of Dierential. Equations. Sigitas Keras. September Department of Applied Mathematics and Theoretical Physics

Spurious Chaotic Solutions of Dierential. Equations. Sigitas Keras. September Department of Applied Mathematics and Theoretical Physics UNIVERSITY OF CAMBRIDGE Numerical Analysis Reports Spurious Chaotic Solutions of Dierential Equations Sigitas Keras DAMTP 994/NA6 September 994 Department of Applied Mathematics and Theoretical Physics

More information

On equidistant constant weight codes

On equidistant constant weight codes Discrete Applied Mathematics 128 (2003) 157 164 www.elsevier.com/locate/dam On equidistant constant weight codes Fang-Wei Fu a;1, Torleiv KlHve b; ;2, Yuan Luo c, Victor K. Wei b a Temasek Laboratories,

More information

Covering an ellipsoid with equal balls

Covering an ellipsoid with equal balls Journal of Combinatorial Theory, Series A 113 (2006) 1667 1676 www.elsevier.com/locate/jcta Covering an ellipsoid with equal balls Ilya Dumer College of Engineering, University of California, Riverside,

More information

An Extremal Doubly Even Self-Dual Code of Length 112

An Extremal Doubly Even Self-Dual Code of Length 112 An Extremal Doubly Even Self-Dual Code of Length 112 Masaaki Harada Department of Mathematical Sciences Yamagata University Yamagata 990 8560, Japan mharada@sci.kj.yamagata-u.ac.jp Submitted: Dec 29, 2007;

More information

2 INTRODUCTION Let C 2 Z n 2 be a binary block code. One says that C corrects r errors if every sphere of radius r in Z n 2 contains at most one codev

2 INTRODUCTION Let C 2 Z n 2 be a binary block code. One says that C corrects r errors if every sphere of radius r in Z n 2 contains at most one codev A NEW UPPER BOUND ON CODES DECODABLE INTO SIZE-2 LISTS A.Ashikhmin Los Alamos National Laboratory Mail Stop P990 Los Alamos, NM 87545, USA alexei@c3serve.c3.lanl.gov A. Barg Bell Laboratories, Lucent Technologies

More information

Secret-sharing with a class of ternary codes

Secret-sharing with a class of ternary codes Theoretical Computer Science 246 (2000) 285 298 www.elsevier.com/locate/tcs Note Secret-sharing with a class of ternary codes Cunsheng Ding a, David R Kohel b, San Ling c; a Department of Computer Science,

More information

Rank and Kernel of binary Hadamard codes.

Rank and Kernel of binary Hadamard codes. 1 Rank and Kernel of binary Hadamard codes. K.T. Phelps, J. Rifà Senior Member IEEE, M. Villanueva Abstract In this paper the rank and the dimension of the kernel for (binary) Hadamard codes of length

More information

On GMW designs and a conjecture of Assmus and Key Thomas E. Norwood and Qing Xiang Dept. of Mathematics, California Institute of Technology, Pasadena,

On GMW designs and a conjecture of Assmus and Key Thomas E. Norwood and Qing Xiang Dept. of Mathematics, California Institute of Technology, Pasadena, On GMW designs and a conjecture of Assmus and Key Thomas E. Norwood and Qing iang Dept. of Mathematics, California Institute of Technology, Pasadena, CA 91125 June 24, 1998 Abstract We show that a family

More information

On John type ellipsoids

On John type ellipsoids On John type ellipsoids B. Klartag Tel Aviv University Abstract Given an arbitrary convex symmetric body K R n, we construct a natural and non-trivial continuous map u K which associates ellipsoids to

More information

On The Weights of Binary Irreducible Cyclic Codes

On The Weights of Binary Irreducible Cyclic Codes On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:

More information

Linear Codes, Target Function Classes, and Network Computing Capacity

Linear Codes, Target Function Classes, and Network Computing Capacity Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:

More information

Circulant Hadamard matrices as HFP-codes of type C 4n C 2. arxiv: v1 [math.co] 26 Nov 2017

Circulant Hadamard matrices as HFP-codes of type C 4n C 2. arxiv: v1 [math.co] 26 Nov 2017 Circulant Hadamard matrices as HFP-codes of type C 4n C 2. arxiv:1711.09373v1 [math.co] 26 Nov 2017 J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona October

More information

Extended Binary Linear Codes from Legendre Sequences

Extended Binary Linear Codes from Legendre Sequences Extended Binary Linear Codes from Legendre Sequences T. Aaron Gulliver and Matthew G. Parker Abstract A construction based on Legendre sequences is presented for a doubly-extended binary linear code of

More information

A subspace of l 2 (X) without the approximation property

A subspace of l 2 (X) without the approximation property A subspace of l (X) without the approximation property by Christopher Chlebovec A dissertation submitted in partial fulfillment of the requirements for the degree of Master of Science (Mathematics) Department

More information

Unsolved Problems in Graph Theory Arising from the Study of Codes*

Unsolved Problems in Graph Theory Arising from the Study of Codes* Unsolved Problems in Graph Theory Arising from the Study of Codes* N. J. A. Sloane Mathematical Sciences Research Center AT&T Bell Laboratories Murray Hill, NJ 07974 1. Two fundamental questions in coding

More information

Lecture 17: Perfect Codes and Gilbert-Varshamov Bound

Lecture 17: Perfect Codes and Gilbert-Varshamov Bound Lecture 17: Perfect Codes and Gilbert-Varshamov Bound Maximality of Hamming code Lemma Let C be a code with distance 3, then: C 2n n + 1 Codes that meet this bound: Perfect codes Hamming code is a perfect

More information

RANK AND PERIMETER PRESERVER OF RANK-1 MATRICES OVER MAX ALGEBRA

RANK AND PERIMETER PRESERVER OF RANK-1 MATRICES OVER MAX ALGEBRA Discussiones Mathematicae General Algebra and Applications 23 (2003 ) 125 137 RANK AND PERIMETER PRESERVER OF RANK-1 MATRICES OVER MAX ALGEBRA Seok-Zun Song and Kyung-Tae Kang Department of Mathematics,

More information

SOLUTION TO RUBEL S QUESTION ABOUT DIFFERENTIALLY ALGEBRAIC DEPENDENCE ON INITIAL VALUES GUY KATRIEL PREPRINT NO /4

SOLUTION TO RUBEL S QUESTION ABOUT DIFFERENTIALLY ALGEBRAIC DEPENDENCE ON INITIAL VALUES GUY KATRIEL PREPRINT NO /4 SOLUTION TO RUBEL S QUESTION ABOUT DIFFERENTIALLY ALGEBRAIC DEPENDENCE ON INITIAL VALUES GUY KATRIEL PREPRINT NO. 2 2003/4 1 SOLUTION TO RUBEL S QUESTION ABOUT DIFFERENTIALLY ALGEBRAIC DEPENDENCE ON INITIAL

More information

Binary construction of quantum codes of minimum distances five and six

Binary construction of quantum codes of minimum distances five and six Discrete Mathematics 308 2008) 1603 1611 www.elsevier.com/locate/disc Binary construction of quantum codes of minimum distances five and six Ruihu Li a, ueliang Li b a Department of Applied Mathematics

More information

STABILITY OF INVARIANT SUBSPACES OF COMMUTING MATRICES We obtain some further results for pairs of commuting matrices. We show that a pair of commutin

STABILITY OF INVARIANT SUBSPACES OF COMMUTING MATRICES We obtain some further results for pairs of commuting matrices. We show that a pair of commutin On the stability of invariant subspaces of commuting matrices Tomaz Kosir and Bor Plestenjak September 18, 001 Abstract We study the stability of (joint) invariant subspaces of a nite set of commuting

More information

A Short Overview of Orthogonal Arrays

A Short Overview of Orthogonal Arrays A Short Overview of Orthogonal Arrays John Stufken Department of Statistics University of Georgia Isaac Newton Institute September 5, 2011 John Stufken (University of Georgia) Orthogonal Arrays September

More information

On Locating-Dominating Codes in Binary Hamming Spaces

On Locating-Dominating Codes in Binary Hamming Spaces Discrete Mathematics and Theoretical Computer Science 6, 2004, 265 282 On Locating-Dominating Codes in Binary Hamming Spaces Iiro Honkala and Tero Laihonen and Sanna Ranto Department of Mathematics and

More information

A NOTE ON RATIONAL OPERATOR MONOTONE FUNCTIONS. Masaru Nagisa. Received May 19, 2014 ; revised April 10, (Ax, x) 0 for all x C n.

A NOTE ON RATIONAL OPERATOR MONOTONE FUNCTIONS. Masaru Nagisa. Received May 19, 2014 ; revised April 10, (Ax, x) 0 for all x C n. Scientiae Mathematicae Japonicae Online, e-014, 145 15 145 A NOTE ON RATIONAL OPERATOR MONOTONE FUNCTIONS Masaru Nagisa Received May 19, 014 ; revised April 10, 014 Abstract. Let f be oeprator monotone

More information

Delsarte s linear programming bound

Delsarte s linear programming bound 15-859 Coding Theory, Fall 14 December 5, 2014 Introduction For all n, q, and d, Delsarte s linear program establishes a series of linear constraints that every code in F n q with distance d must satisfy.

More information

Vector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition)

Vector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition) Vector Space Basics (Remark: these notes are highly formal and may be a useful reference to some students however I am also posting Ray Heitmann's notes to Canvas for students interested in a direct computational

More information

Bounds for binary codes with narrow distance distributions

Bounds for binary codes with narrow distance distributions Bounds for binary codes with narrow distance distributions Ron M Roth, Gadiel Seroussi Advanced Studies HP Laboratories Palo Alto HPL-006-136 September 9, 006* constant-weight codes, distance distribution,

More information

arxiv: v1 [math.co] 17 Jul 2007

arxiv: v1 [math.co] 17 Jul 2007 arxiv:0707.2591v1 [math.co] 17 Jul 2007 An Elementary Proof of the Fundamental Theorem of Tropical Algebra Nathan Grigg Nathan Manwaring May 22, 2018 Abstract In this paper we give an elementary proof

More information

On the vanishing of Tor of the absolute integral closure

On the vanishing of Tor of the absolute integral closure On the vanishing of Tor of the absolute integral closure Hans Schoutens Department of Mathematics NYC College of Technology City University of New York NY, NY 11201 (USA) Abstract Let R be an excellent

More information

Permutation decoding for the binary codes from triangular graphs

Permutation decoding for the binary codes from triangular graphs Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for

More information

Orthogonal Arrays & Codes

Orthogonal Arrays & Codes Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible

More information

UNIFORM BOUNDS FOR BESSEL FUNCTIONS

UNIFORM BOUNDS FOR BESSEL FUNCTIONS Journal of Applied Analysis Vol. 1, No. 1 (006), pp. 83 91 UNIFORM BOUNDS FOR BESSEL FUNCTIONS I. KRASIKOV Received October 8, 001 and, in revised form, July 6, 004 Abstract. For ν > 1/ and x real we shall

More information

arxiv: v1 [cs.it] 12 Jun 2016

arxiv: v1 [cs.it] 12 Jun 2016 New Permutation Trinomials From Niho Exponents over Finite Fields with Even Characteristic arxiv:606.03768v [cs.it] 2 Jun 206 Nian Li and Tor Helleseth Abstract In this paper, a class of permutation trinomials

More information

ON SUM OF SQUARES DECOMPOSITION FOR A BIQUADRATIC MATRIX FUNCTION

ON SUM OF SQUARES DECOMPOSITION FOR A BIQUADRATIC MATRIX FUNCTION Annales Univ. Sci. Budapest., Sect. Comp. 33 (2010) 273-284 ON SUM OF SQUARES DECOMPOSITION FOR A BIQUADRATIC MATRIX FUNCTION L. László (Budapest, Hungary) Dedicated to Professor Ferenc Schipp on his 70th

More information

Novel Approach to Analysis of Nonlinear Recursions. 1 Department of Physics, Bar-Ilan University, Ramat-Gan, ISRAEL

Novel Approach to Analysis of Nonlinear Recursions. 1 Department of Physics, Bar-Ilan University, Ramat-Gan, ISRAEL Novel Approach to Analysis of Nonlinear Recursions G.Berkolaiko 1 2, S. Rabinovich 1,S.Havlin 1 1 Department of Physics, Bar-Ilan University, 529 Ramat-Gan, ISRAEL 2 Department of Mathematics, Voronezh

More information

IMC 2015, Blagoevgrad, Bulgaria

IMC 2015, Blagoevgrad, Bulgaria IMC 05, Blagoevgrad, Bulgaria Day, July 9, 05 Problem. For any integer n and two n n matrices with real entries, B that satisfy the equation + B ( + B prove that det( det(b. Does the same conclusion follow

More information

The Structure of Z 2 Z 2 s-additive Codes: Bounds on the Minimum Distance

The Structure of Z 2 Z 2 s-additive Codes: Bounds on the Minimum Distance Appl Math Inf Sci 7, No 6, 2271-2278 (2013) 2271 Applied Mathematics & Information Sciences An International Journal http://dxdoiorg/1012785/amis/070617 The Structure of Z 2 Z 2 s-additive Codes: Bounds

More information

A Tutorial on Orthogonal Arrays: Constructions, Bounds and Links to Error-correcting Codes

A Tutorial on Orthogonal Arrays: Constructions, Bounds and Links to Error-correcting Codes A Tutorial on Orthogonal Arrays: onstructions, ounds and Links to Error-correcting odes Douglas R. Stinson David R. heriton School of omputer Science University of Waterloo D.R. Stinson 1 Talk Outline

More information

Optimal global rates of convergence for interpolation problems with random design

Optimal global rates of convergence for interpolation problems with random design Optimal global rates of convergence for interpolation problems with random design Michael Kohler 1 and Adam Krzyżak 2, 1 Fachbereich Mathematik, Technische Universität Darmstadt, Schlossgartenstr. 7, 64289

More information

Comments on "Generating and Counting Binary Bent Sequences"

Comments on Generating and Counting Binary Bent Sequences University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 1994 Comments on "Generating and Counting Binary Bent Sequences" Claude

More information

Max-Planck-Institut fur Mathematik in den Naturwissenschaften Leipzig Uniformly distributed measures in Euclidean spaces by Bernd Kirchheim and David Preiss Preprint-Nr.: 37 1998 Uniformly Distributed

More information

Codes from lattice and related graphs, and permutation decoding

Codes from lattice and related graphs, and permutation decoding Codes from lattice and related graphs, and permutation decoding J. D. Key School of Mathematical Sciences University of KwaZulu-Natal Pietermaritzburg 3209, South Africa B. G. Rodrigues School of Mathematical

More information

Codes and invariant theory.

Codes and invariant theory. odes and invariant theory. Gabriele Nebe Lehrstuhl D für Mathematik, RWTH Aachen, 5056 Aachen, Germany, nebe@math.rwth-aachen.de 1 Summary. There is a beautiful analogy between most of the notions for

More information

Traditional Lexicodes. Linear Bound on Decoding Steps. Quadratic Bound on Decoding Steps State Bound=2^6 State Bound=2^5 State Bound=2^4

Traditional Lexicodes. Linear Bound on Decoding Steps. Quadratic Bound on Decoding Steps State Bound=2^6 State Bound=2^5 State Bound=2^4 Lexicographic Codes: Constructions Bounds, and Trellis Complexity Ari Trachtenberg Digital Computer Laboratory University of Illinois at Urbana-Champaign 1304 W. Springeld Avenue, Urbana, IL 61801 Alexander

More information

Applications of Semidefinite Programming to Coding Theory

Applications of Semidefinite Programming to Coding Theory Applications of Semidefinite Programming to Coding Theory Christine Bachoc Institut de Mathématiques de Bordeaux Université Bordeaux 1 351, cours de la Libération, 33405 Talence, France Email: {christine.bachoc}@math.u-bordeaux1.fr

More information

THE DENOMINATORS OF POWER SUMS OF ARITHMETIC PROGRESSIONS. Bernd C. Kellner Göppert Weg 5, Göttingen, Germany

THE DENOMINATORS OF POWER SUMS OF ARITHMETIC PROGRESSIONS. Bernd C. Kellner Göppert Weg 5, Göttingen, Germany #A95 INTEGERS 18 (2018) THE DENOMINATORS OF POWER SUMS OF ARITHMETIC PROGRESSIONS Bernd C. Kellner Göppert Weg 5, 37077 Göttingen, Germany b@bernoulli.org Jonathan Sondow 209 West 97th Street, New Yor,

More information

PROOF OF TWO MATRIX THEOREMS VIA TRIANGULAR FACTORIZATIONS ROY MATHIAS

PROOF OF TWO MATRIX THEOREMS VIA TRIANGULAR FACTORIZATIONS ROY MATHIAS PROOF OF TWO MATRIX THEOREMS VIA TRIANGULAR FACTORIZATIONS ROY MATHIAS Abstract. We present elementary proofs of the Cauchy-Binet Theorem on determinants and of the fact that the eigenvalues of a matrix

More information

Tilings of Binary Spaces

Tilings of Binary Spaces Tilings of Binary Spaces Gérard Cohen Département Informatique ENST, 46 rue Barrault 75634 Paris, France Simon Litsyn Department of Electrical Engineering Tel-Aviv University Ramat-Aviv 69978, Israel Alexander

More information

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols

More information

A classification of MDS binary systematic codes

A classification of MDS binary systematic codes A classification of MDS binary systematic codes Eleonora Guerrini (guerrini@science.unitn.it) Department of Mathematics, University of Trento, Italy. Massimiliano Sala (msala@bcri.ucc.ie) Boole Centre

More information

Neighborly families of boxes and bipartite coverings

Neighborly families of boxes and bipartite coverings Neighborly families of boxes and bipartite coverings Noga Alon Dedicated to Professor Paul Erdős on the occasion of his 80 th birthday Abstract A bipartite covering of order k of the complete graph K n

More information

On Computing the Hamming Distance

On Computing the Hamming Distance Acta Cybernetica 16 (2004) 443 449. On Computing the Hamming Distance Gerzson Kéri and Ákos Kisvölcsey Abstract Methods for the fast computation of Hamming distance developed for the case of large number

More information

arxiv: v2 [math.co] 17 May 2017

arxiv: v2 [math.co] 17 May 2017 New nonbinary code bounds based on divisibility arguments Sven Polak 1 arxiv:1606.05144v [math.co] 17 May 017 Abstract. For q, n, d N, let A q (n, d) be the maximum size of a code C [q] n with minimum

More information

ON QUADRAPELL NUMBERS AND QUADRAPELL POLYNOMIALS

ON QUADRAPELL NUMBERS AND QUADRAPELL POLYNOMIALS Hacettepe Journal of Mathematics and Statistics Volume 8() (009), 65 75 ON QUADRAPELL NUMBERS AND QUADRAPELL POLYNOMIALS Dursun Tascı Received 09:0 :009 : Accepted 04 :05 :009 Abstract In this paper we

More information

Interesting Examples on Maximal Irreducible Goppa Codes

Interesting Examples on Maximal Irreducible Goppa Codes Interesting Examples on Maximal Irreducible Goppa Codes Marta Giorgetti Dipartimento di Fisica e Matematica, Universita dell Insubria Abstract. In this paper a full categorization of irreducible classical

More information

ON BOUNDEDNESS OF MAXIMAL FUNCTIONS IN SOBOLEV SPACES

ON BOUNDEDNESS OF MAXIMAL FUNCTIONS IN SOBOLEV SPACES Annales Academiæ Scientiarum Fennicæ Mathematica Volumen 29, 2004, 167 176 ON BOUNDEDNESS OF MAXIMAL FUNCTIONS IN SOBOLEV SPACES Piotr Haj lasz and Jani Onninen Warsaw University, Institute of Mathematics

More information

Discrete Applied Mathematics 105 (2000) On (n; k)-sequences. Received 7 April 1999; revised 21 December 1999; accepted 22 December 1999

Discrete Applied Mathematics 105 (2000) On (n; k)-sequences. Received 7 April 1999; revised 21 December 1999; accepted 22 December 1999 Discrete Applied Mathematics 105 (2000) 183 192 On (n; k)-sequences Hong-Yeop Song a;, June Bok Lee b a Department of Electrical and Computer Engineering, Yonsei University, Seoul 120-749, South Korea

More information

Asymptotics of generating the symmetric and alternating groups

Asymptotics of generating the symmetric and alternating groups Asymptotics of generating the symmetric and alternating groups John D. Dixon School of Mathematics and Statistics Carleton University, Ottawa, Ontario K2G 0E2 Canada jdixon@math.carleton.ca October 20,

More information

The 123 Theorem and its extensions

The 123 Theorem and its extensions The 123 Theorem and its extensions Noga Alon and Raphael Yuster Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv University, Tel Aviv, Israel Abstract It is shown

More information

The Symplectic Camel and Quantum Universal Invariants: the Angel of Geometry versus the Demon of Algebra

The Symplectic Camel and Quantum Universal Invariants: the Angel of Geometry versus the Demon of Algebra The Symplectic Camel and Quantum Universal Invariants: the Angel of Geometry versus the Demon of Algebra Maurice A. de Gosson University of Vienna, NuHAG Nordbergstr. 15, 19 Vienna April 15, 213 Abstract

More information

New Inequalities for q-ary Constant-Weight Codes

New Inequalities for q-ary Constant-Weight Codes New Inequalities for q-ary Constant-Weight Codes Hyun Kwang Kim 1 Phan Thanh Toan 1 1 Department of Mathematics, POSTECH International Workshop on Coding and Cryptography April 15-19, 2013, Bergen (Norway

More information

Quantum Error Detection I: Statement of the Problem

Quantum Error Detection I: Statement of the Problem 778 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 46, NO 3, MAY 2000 Quantum Error Detection I: Statement of the Problem Alexei E Ashikhmin, Alexander M Barg, Emanuel Knill, and Simon N Litsyn, Member,

More information

1 x i. i=1 EVEN NUMBERS RAFAEL ARCE-NAZARIO, FRANCIS N. CASTRO, AND RAÚL FIGUEROA

1 x i. i=1 EVEN NUMBERS RAFAEL ARCE-NAZARIO, FRANCIS N. CASTRO, AND RAÚL FIGUEROA Volume, Number 2, Pages 63 78 ISSN 75-0868 ON THE EQUATION n i= = IN DISTINCT ODD OR EVEN NUMBERS RAFAEL ARCE-NAZARIO, FRANCIS N. CASTRO, AND RAÚL FIGUEROA Abstract. In this paper we combine theoretical

More information

Asymmetric binary covering codes

Asymmetric binary covering codes Asymmetric binary covering codes Joshua N Cooper and Robert B Ellis Department of Mathematics, University of California at San Diego, La Jolla, California E-mail: cooper@mathucsdedu, rellis@mathucsdedu

More information

Binary Convolutional Codes of High Rate Øyvind Ytrehus

Binary Convolutional Codes of High Rate Øyvind Ytrehus Binary Convolutional Codes of High Rate Øyvind Ytrehus Abstract The function N(r; ; d free ), defined as the maximum n such that there exists a binary convolutional code of block length n, dimension n

More information

A RELATION BETWEEN SCHUR P AND S. S. Leidwanger. Universite de Caen, CAEN. cedex FRANCE. March 24, 1997

A RELATION BETWEEN SCHUR P AND S. S. Leidwanger. Universite de Caen, CAEN. cedex FRANCE. March 24, 1997 A RELATION BETWEEN SCHUR P AND S FUNCTIONS S. Leidwanger Departement de Mathematiques, Universite de Caen, 0 CAEN cedex FRANCE March, 997 Abstract We dene a dierential operator of innite order which sends

More information

Structural Grobner Basis. Bernd Sturmfels and Markus Wiegelmann TR May Department of Mathematics, UC Berkeley.

Structural Grobner Basis. Bernd Sturmfels and Markus Wiegelmann TR May Department of Mathematics, UC Berkeley. I 1947 Center St. Suite 600 Berkeley, California 94704-1198 (510) 643-9153 FAX (510) 643-7684 INTERNATIONAL COMPUTER SCIENCE INSTITUTE Structural Grobner Basis Detection Bernd Sturmfels and Markus Wiegelmann

More information

On Linear Subspace Codes Closed under Intersection

On Linear Subspace Codes Closed under Intersection On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F

More information

Lecture 19: Elias-Bassalygo Bound

Lecture 19: Elias-Bassalygo Bound Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecturer: Atri Rudra Lecture 19: Elias-Bassalygo Bound October 10, 2007 Scribe: Michael Pfetsch & Atri Rudra In the last lecture,

More information

On the power-free parts of consecutive integers

On the power-free parts of consecutive integers ACTA ARITHMETICA XC4 (1999) On the power-free parts of consecutive integers by B M M de Weger (Krimpen aan den IJssel) and C E van de Woestijne (Leiden) 1 Introduction and main results Considering the

More information

Weighted Sums of Orthogonal Polynomials Related to Birth-Death Processes with Killing

Weighted Sums of Orthogonal Polynomials Related to Birth-Death Processes with Killing Advances in Dynamical Systems and Applications ISSN 0973-5321, Volume 8, Number 2, pp. 401 412 (2013) http://campus.mst.edu/adsa Weighted Sums of Orthogonal Polynomials Related to Birth-Death Processes

More information

(each row defines a probability distribution). Given n-strings x X n, y Y n we can use the absence of memory in the channel to compute

(each row defines a probability distribution). Given n-strings x X n, y Y n we can use the absence of memory in the channel to compute ENEE 739C: Advanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 6 (draft; 9/6/03. Error exponents for Discrete Memoryless Channels http://www.enee.umd.edu/ abarg/enee739c/course.html

More information