Construction of Barnes-Wall Lattices from Linear Codes over Rings

Size: px
Start display at page:

Download "Construction of Barnes-Wall Lattices from Linear Codes over Rings"

Transcription

1 01 IEEE International Symposium on Information Theory Proceedings Construction of Barnes-Wall Lattices from Linear Codes over Rings J Harshan Dept of ECSE, Monh University Clayton, Australia harshanjagadeesh@monhedu Emanuele Viterbo Dept of ECSE, Monh University Clayton, Australia emanueleviterbo@monhedu J-C Belfiore Dept of Communications and Electronics, Telecom ParisTech Paris, France belfiore@enstfr Abstract Dense lattice packings can be obtained via the wellknown Construction A from binary linear codes In this paper, we use an extension of Construction A called Construction A to obtain Barnes-Wall lattices from linear codes over polynomials rings To obtain the Barnes-Wall lattice BW m in C m for any m 1, we first identify a linear code C m over the quotient ring U m = F [u] u m and then propose a mapping ψ : U m Z[i] such that the code L m = ψ(c m) is a lattice constellation Further, we show that L m h the cubic shaping property when m is even Finally, we show that BW m can be obtained through Construction A BW m =(1+i) m Z[i] m L m I INTRODUCTION This paper addresses the construction of dense lattice packings [1] using linear block codes [] Towards explaining the problem statement, we present a series of definitions used in this paper A complex lattice Λ is a discrete subgroup of C n [1] Alternatively, Λ is a Z[i]-module generated by the vectors {v 1, v,, v n v j C n n Λ= q j v j q j Z[i] j=1 We refer to a set L a lattice Euclidean code (or lattice constellation) in C n if L is a finite subset of lattice Λ It is well known that any set S in C n h a one-one correspondence to a set (denoted by S) in R n S = {[R(x) I(x)] x S Using the above equivalence from C to R, we make the following definition on a lattice Euclidean code Definition 1: A lattice Euclidean code L Λis said to have the cubic shaping property if the corresponding set L can be written L = Λ az n, for some a Z The above definition implies that a lattice Euclidean code L with cubic shaping property is a subset of Z a [i] n for some a Z, where Z a is the ring of integers modulo a Henceforth, throughout the paper, a Euclidean code refers to a lattice Euclidean code Definition : (Chapter 4 in []) We define the polynomial quotient ring U m = F [u] u m in variable u for any m 1 { U m = b k u k b k F, with regular polynomial addition and multiplication over F coefficients along with the quotient operation u m =0, which is equivalent to cancelling all the terms of degree greater than or equal to m Definition 3: A subset of Um n denoted by C is called a linear code over U m if C can be obtained through a generator matrix G Um k n C = { zg z Um k, for some k n and the matrix multiplication is over the ring U m Using the above definitions, we now discuss the subject matter of this paper Systematic use of binary error-correcting codes to construct some structured lattices is well known in the literature [1] For example, the checkerboard lattice D R can be constructed (Chapter 4, Section 7, [1]) D =Z L, where L = {ψ(c) c Cis an Euclidean code obtained by embedding the codewords of C the repetition code (, 1, ) over F = {0, 1 into the Euclidean space using the mapping ψ : F Z such that ψ(0) =0and ψ(1) =1 Depending on the structure of the underlying linear error correcting codes, lattice construction can be categorized into different types [1] In this paper, we consider a special cls of constructions called Construction A which is defined formally follows: Definition 4: (Sec, Chapter 5, [1]) A lattice Λ over Z is obtained Construction A from the binary linear code C if Λ can be represented Λ=Z n L, (1) where L = {ψ(c) c C Z n is an Euclidean code obtained by the component-wise mapping ψ : F Z given by ψ(0) =0and ψ(1) =1on the alphabet of C In the above definition, the linear code C is restricted to be over F and Λ is viewed a lattice over Z However, in general, we could also view Λ a complex lattice, ie, a lattice over Z[i], and construct Λ using linear code C over finite rings We introduce a new construction of lattices by relaxing the constraint on the alphabet of the linear code C Our construction is an extension of Construction A and hence, we refer it Construction A For the most generalized /1/$ IEEE 3110

2 definition of Construction A, we refer the reader to [3] We use an abstract ring R to denote either Z - the ring of integers or Z[i] - the ring of Gaussian integers Definition 5: A lattice Λ over R is obtained through Construction A from the linear code C over the alphabet U m = F [u] u m for some m 1 if Λ can be represented Λ=u m R n L, () where L = {ψ(c) c C R n is an Euclidean code obtained by using an appropriate mapping ψ : U m R, and {, if R = Z, u = 1+i, if R = Z[i] Note that Construction A can be obtained a special ce from Construction A when m =1and R = Z, wherein the embedding operation ψ coincides with the one in Definition 4 In this paper, we provide Construction A of Barnes-Wall lattice [1], [4], [5], [6], [7] of dimension m for m 1 by viewing it a lattice over Z[i] In other words, we present the following key ingredients needed for Construction A of Barnes-Wall lattices for every m 1: 1) An appropriate linear code C m over the alphabet U m ) A suitable mapping ψ : U m Z[i] in order to obtain the Euclidean code L m with cubic shaping property Throughout the paper, unless specified, the dimension of the Barnes-Wall lattice refers to its rank a lattice over Z[i] We list the contributions and the organisation of the paper given below: We introduce Construction A of lattices ( in Definition 5) which facilitates us to generate some well structured lattices from linear codes over finite rings Asanim- mediate application, we apply Construction A to obtain Barnes-Wall lattices of dimension m by embedding a linear code C m over the quotient ring U m to a Euclidean code in Z[i] m for any m 1 (Section II) First, we identify the structure of the linear code C m by using Construction D of Barnes-Wall lattices Subsequently, we provide a linear encoder to map the information bits onto the codewords of C m We identify that the generator matrix for C m is given by [ ] m 1 1 G m =, 0 u where the tensor operation is over U m (Section II) We also prove the equivalence of our encoding technique to Construction D (Section III) To find out ψ and L m, we first obtain the Euclidean code EC m = {Φ(c) c C m Z[i] m, through the mapping Φ:U m Z[i] Φ b j u j = b j (Φ(u)) j, with Φ(u) = 1 + i At this stage, we point out that EC m is an arbitrary subset of BW m and does not have cubic shaping To fix this problem, we provide a oneone mapping φ : EC m L m BW m such that L m h cubic shaping property for even values of m (Section IV) With this, the mapping ψ ( in Definition 5) is the composition mapping φ(φ( )) on U m, and we show that BW m is obtained BW m =(1+i) m Z[i] m L m More details on this work can be found in [8] Apart from providing further details on Construction A of Barnes-Wall lattices, a thorough study on the performance of Euclidean codes from Barnes-Wall lattice constellations is also reported in [8] Notations: Throughout the paper, boldface letters and capital boldface letters are used to represent vectors and matrices, respectively For a complex matrix X, the matrices X T, R(X) and I(X) denote, respectively, the transpose, real part and imaginary part of X For a vector x, we use x j to represent the j-th component of x The set of all integers, the real numbers, and the complex numbers are, respectively, denoted by Z, R, and C, and i = 1 Cardinality of a set S is denoted by S Absolute value of a complex number x is denoted by x The number of ways of picking n objects out of m objects is denoted by C m n The n-length zero vector is denoted by 0 n II CONSTRUCTION A OF BARNES-WALL LATTICE First, we recall Construction D of Barnes-Wall lattices, and subsequently propose its Construction A from a suitable code A Construction D of Barnes-Wall lattice Barnes-Wall lattice can be obtained via Construction D [4] a Z[i] lattice follows: Suppose we want to construct the lattice BW m of dimension m where m 1, let RM(r, m) be the binary Reed-Muller (RM) code (Sec 37, Chapter 3, []) of length m and of order 0 r m With this, BW m can be constructed in (3) given at the top of next page, where ψ( ) is given in Definition 4 For notational convenience, we also write (3) BW m =(1+i) m Z[i] m (1 + i) r RM(r, m) (4) This method generates BW m a multi-level structure of nested RM codes and hence it falls under Construction D [1] Example 1: BW 4 (which is also known E 8 over Z) is constructed BW 4 =(1+i) Z[i] 4 (1 + i)rm(1, ) RM(0, ), where the code RM(1, ) = (4, 3, ) and the code RM(0, ) = (4, 1, 4) in the clsical (n, k, d min ) format Example : BW 16 is obtained BW 16 =(1+i) 4 Z[i] 16 (1 + i) 3 (16, 15, ) (1 + i) (16, 11, 4) (1 + i)(16, 5, 8) (16, 1, 6) 3111

3 { BW m = (1 + i) m a + (1 + i) r ψ(c r ) c r RM(r, m), a Z[i] m (3) B Construction A In order to obtain BW m Construction A, we first need to find a suitable linear code C m over an appropriate ring To find such a code, we are interested in understanding the following expression in (4), EC m = (1 + i) r RM(r, m), (5) a single code If we denote u =1+i and consider u a symbol, then the expression u r RM(r, m), (6) can be viewed a code denoted by C m over the ring U m Example 3: For BW 4, the code C 4 is given by u(4, 3, )+ (4, 1, 4), which can be viewed a code over the quotient ring U Example 4: Another example is C 16, which is obtained from BW 16 and is given by C 16 = (16, 1, 6)+u(16, 5, 8)+u (16, 11, 4)+u 3 (16, 15, ), where C 16 is defined over U 4 In general, the ring on which the code C m = u r RM(r, m) (7) is defined is the quotient ring U m With this, we have identified the linear code C m to be useful for Construction A of BW m In the rest of this subsection, we provide a linear encoder to generate the codewords of C m It is known that the m - dimensional Barnes-Wall lattice BW m over Z[i] is generated by the rows of the m-fold Kronecker product [6] [ ] m 1 1 G = 0 (1+i) Replacing u =1+i a symbol and making u m =0in G, we obtain the generator matrix G m which can be viewed a matrix over U m Example 5: The generator matrix G 4 is given by G 4 = 0 u 0 u 0 0 u u U By using G m a matrix over U m, the code C m is obtained below: Encoding of C m: Let z Um m, ie, the j-th component of z is given by z j = b k,j u k, (8) where b k,j F for all k, j Using z and G m, the code C m Um m can be obtained C m = {x = zg m z U m m, (9) where the matrix multiplication is over U m Proposition 1: The rate of the code C m in bits per codeword is ( m )m Proof: Each component of z carries m information bits in the variables b k,j shown in (8) This amounts to a total of m m bits carried by z However, since the matrix multiplication is over U m, not all the information bits b k,j are encoded codewords of C m (due to u m =0) Using the structure of G m it is possible to identify the indices (k, j) of information bits b k,j which get encoded into the codewords of C m follows: Let the set I q denote the indices of the rows of G m whose components take values from the binary set {0,u q for q =0, 1, m 1 Due to the quotient operation u m =0, the components of z which are in the index set I q are restricted to be of the form, z j = q b k,j u k j I q For example, z 1 = b k,1u k and z m =0 Using the structure of G m we observe that I q = Cq m, and hence find the total number of information bits on a codeword of C m m (m k)cm k Therefore, the rate of C m in bits per codeword is i=0 Cm i (m i) = m m We now provide an example for the proposed encoding technique, showcing the positions of the information bits that get encoded to the codewords of C m Example 6: For m =3, the input vector z and G 8 are of the form, b 0,1 + b 1,1 u + b,1 u b 0, + b 1, u b 0,3 + b 1,3 u z T = b 0,4 b 0,5 + b 1,5 u and b 0,6 b 0, u 0 u 0 u 0 u 0 0 u u 0 0 u u G 8 = u u u u u u u 0 u u u

4 III ON EQUIVALENCE OF CONSTRUCTION A TO CONSTRUCTION D In this subsection, we prove the equivalence of our encoding technique to Construction D In other words, the following theorem shows that the codewords generated in (9) can be uniquely represented vectors of a multi-level code of nested RM codes in (7) Theorem 1: The codewords generated in (9) can be uniquely represented codewords obtained through Construction D Proof: The entries of G m take values from the set {0, 1,u,u, u After suitable row permutations, G m can be written ur 1 G m =, (10) u R u m R m where R k F Cm k m Note that [R T 0 R T 1 R T r ] T is a generator matrix of the r-th order RM code for r m Recalling the encoding technique, the code C m is obtained C m = {x = zg m z Um m where the matrix multiplication is over U m The vector z can be written z = ub, where u = [ 1 u u u m u ] Um 1 m and B = b 0,0 b 0,1 b 0, m b 0, m 1 b 1,0 b 1,1 b 1, m b 1, m 1 b,0 b,1 b, m b, m 1 b m,0 b m,1 b m, m b m, m 1 b,0 b,1 b, m b, m 1 F m m Note that b k,j are the information bits to be encoded into codewords of C m We split the information matrix B [B 0 B 1 B m ] where B k F m Cm k for k =0, 1, m After the above split, the BW lattice vector x is obtained ur 1 x = u[b 0 B 1 B m ] u R u m R m The RHS of the above operation can be alternately written R 1 x = u[ B 0 B 1 B m ], R R m {{ G RM [ ] 0 where B k = k C m k Note that G B k ([1 : m k], :) RM is the nested RM generator matrix We use the notation B = [ B 0 B 1 B m ] We also point out that the informations bits in each row of B are encoded to RM codewords of appropriate order by the matrix multiplication BG RM Due to zero entries in B, the matrix B h only k 1 n=0 Cm n information bits in the k-th row of B for k =1,, m Since, these k 1 n=0 Cm n bits are placed in the first many columns of B, the information bits in the k-th row of B are encoded into a RM codeword of (k 1)-th order Finally, on the multiplication of u from left, the generated RM codewords are appropriately weighed by powers of u and added This proves the equivalence of our construction to Construction D Till now, we have identified the linear code C m and its encoding technique over the quotient ring U m In the next subsection, we discuss embedding of C m into the Euclidean space Z[i] m IV EMBEDDING TO BARNES-WALL LATTICE AND CUBIC SHAPING By using the map Φ(u) =1+i on C m, we get a Euclidean code given by EC m = {Φ(c) c C m Z[i] m, = (1 + i) r RM(r, m), (11) where Φ maps the symbols of U m into Z[i] Φ b j u j = b j (Φ(u)) j (1) It is to be noted that EC m is an arbitrary subset of BW m and does not have cubic shaping To fix this problem, we propose a one-one mapping φ on EC m to obtain a new Euclidean code denoted by L m such that L m h cubic shaping when m is even For any x =[x 1,x,x 3,,x m] EC m, the mapping φ operates on each component of x, { φ(x j )= x j mod m (, when ) m is even; ϕ x j mod m+1, when m is odd, where ϕ( ) is defined on Z m+1 z + ϕ(z) = [i], z, when I(z) < ( i z ( + i ), when R(z) < ; and I(z) ) ;, when R(z) (13) (14) and I(z) The mapping φ guarantees the following property on L m: { Z m [i] m, if m is even; L m (15) {Z m+1 m + i{z m, if m is odd 3113

5 From (15), note that each component of the vector in L m is in a cubic box and a rectangular box, when m is even and odd, respectively With this, the mapping ψ (given in Definition 5) needed to obtain the Euclidean code L m from C m can be written ψ = φ(φ( )), (16) where Φ and φ are given in (1) and (13) respectively Proposition : The rate of the Euclidean code L m in bits per complex dimension is m Proof: The proof follows from the one-one nature of ψ and the result of Proposition 1 For the proof on the one-one nature of ψ, we refer the reader to Proposition of [8] Remark 1: We point out that Construction A does not qualify to be the generalized Construction A of [3] since the proposed embedding operation ψ is not a linear map The following theorem shows that ψ retains the Barnes- Wall lattice structure on L m and proves Construction A of BW m Theorem : The Euclidean code L m and the lattice BW m are related BW m =(1+i) m Z[i] m L m Proof: Consider the ce when m is even From (3) and (11), any z BW m can be written z =(1+i) m a + x, (17) where a Z[i] m and x EC m Further, upon the modulo operation in (13), x satisfies x = m r + φ(x), where φ(x) L m and r Z[i] m This implies φ(x) =x m r = x +(1+i) m r, (18) for some r Z[i] m The second equality follows (1 + i) m = a m where a {1, 1,i, i (19) The RHS of (18) is in the form of (3) and hence L m BW m Further, combining (17) and (18), we have z =(1+i) m a + φ(x), (0) for some a Z[i] m and φ(x) L m From (15), we also observe that (1 + i) m Z[i] m L m = m Z[i] m L m = {0 m (1) The first equality in the above equation follows from (19) With (0) and (1), the statement of the theorem follows when m is even We now consider the ce when m is odd For this ce, we first study the mod m+1 operation in (13), and subsequently study the effect of ϕ With the mod operation, any x EC m satisfies x = m+1 r + x, where x Z m+1 [i] m and r Z[i] m This implies Barnes-Wall lattice point Further, the constants added in (14) are such that (1 i) =a (1 + i) m and (1 + i) =b (1 + i) m for some a, b Z[i] Therefore, ϕ( x) continues to be a Barnes- Wall lattice point We also know that x =(1+i) m r + φ(x), for some r Z[i] m and φ(x) L m Finally, from (15), we have (1 + i) m Z[i] m L m = (1 + i)z[i] m L m = {0 m The first equality in the above equation follows (1 + i) m is of the form a where a = ±1 ± i This completes the proof when m is odd Using the results of Theorem, the Construction A of BW m is given by BW m =(1+i) m Z[i] m L m, where L m is the Euclidean code obtained from C m through the mapping ψ = φ(φ( )) on U m V CONCLUSION In this paper, we have introduced an extension of Construction A to obtain the cls of Barnes-Wall lattices from linear codes over rings We highlight that the mapping ψ provides the cubic shaping property on the Euclidean code, which in turn facilitates labelling of information bits if the Euclidean code is to be used a coded modulation scheme ACKNOWLEDGMENT This work w performed within the Monh Software Defined Telecommunications Lab and supported by the Monh Professional Fellowship 011 REFERENCES [1] JH Conway and NJA Sloane, Sphere Packings, Lattices and Groups, Second Edition, 1993, Springer-Verlag, New York [] R E Blahut, Theory and Practice of Error Control Codes, Addison- Wesley Publishing Company, Inc, 1983 [3] GD Forney, and A Vardy, Generalized Minimum-Distance Decoding of Euclidean-Space Codes and Lattices, IEEE Transactions on Information Theory, vol 4, no 6, Nov 1996, pp [4] GD Forney, Coset Codes- Part II: Binary Lattices and Related Codes, IEEE Transactions on Information Theory, vol 34, no 5, Sept 1988, pp [5] G Nebe, E M Rains and N J A Sloane, A Simple Construction of the Barnes-Wall Lattices, in Codes, Graphs, and Systems: A Celebration of the Life and Career of G David Forney, Jr on the Occion of his Sixtieth Birthday, ed R E Blahut and R Koetter, Kluwer, 00, pp [6] D Micciancio, and A Nicolsi, Efficient Bounded Distance Decoders for Barnes-Wall Lattices, in the Proc of IEEE ISIT 008, Toronto, Canada, July 6-11, 008 [7] A J Salomon, and O Amrani, Augmented Product Codes and Lattices: Reed-Muller Codes and Barnes-Wall Lattices, IEEE Transactions on Information Theory, vol 51, no 11, Nov 005, pp [8] J Harshan, E Viterbo, and J-C Belfiore, Practical Encoders and Decoders for Euclidean Codes from Barnes-Wall Lattices, available on arxiv:10338v [csit], March 01 x = x m+1 r = x +(1+i) m r, () for some r Z[i] m The second equality follows m+1 = a (1+i) m for some a Z[i] We point out that x is already a 3114

Codes from Barnes-Wall Lattices

Codes from Barnes-Wall Lattices Practical Encoders and Decoders for Euclidean Codes from Barnes-Wall Lattices J. Harshan*, Emanuele Viterbo*, and Jean-Claude Belfiore 1 arxiv:1203.3282v3 [cs.it] 8 Jan 2013 Abstract In this paper, we

More information

Efficient Bounded Distance Decoders for Barnes-Wall Lattices

Efficient Bounded Distance Decoders for Barnes-Wall Lattices Efficient Bounded Distance Decoders for Barnes-Wall Lattices Daniele Micciancio Antonio Nicolosi April 30, 2008 Abstract We describe a new family of parallelizable bounded distance decoding algorithms

More information

On the Robustness of Algebraic STBCs to Coefficient Quantization

On the Robustness of Algebraic STBCs to Coefficient Quantization 212 Australian Communications Theory Workshop (AusCTW) On the Robustness of Algebraic STBCs to Coefficient Quantization J. Harshan Dept. of Electrical and Computer Systems Engg., Monash University Clayton,

More information

Lattices for Communication Engineers

Lattices for Communication Engineers Lattices for Communication Engineers Jean-Claude Belfiore Télécom ParisTech CNRS, LTCI UMR 5141 February, 22 2011 Nanyang Technological University - SPMS Part I Introduction Signal Space The transmission

More information

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q

MATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q MATH-315201 This question paper consists of 6 printed pages, each of which is identified by the reference MATH-3152 Only approved basic scientific calculators may be used. c UNIVERSITY OF LEEDS Examination

More information

Phase Precoded Compute-and-Forward with Partial Feedback

Phase Precoded Compute-and-Forward with Partial Feedback Phase Precoded Compute-and-Forward with Partial Feedback Amin Sakzad, Emanuele Viterbo Dept. Elec. & Comp. Sys. Monash University, Australia amin.sakzad,emanuele.viterbo@monash.edu Joseph Boutros, Dept.

More information

Leech Constellations of Construction-A Lattices

Leech Constellations of Construction-A Lattices Leech Constellations of Construction-A Lattices Joseph J. Boutros Talk at Nokia Bell Labs, Stuttgart Texas A&M University at Qatar In collaboration with Nicola di Pietro. March 7, 2017 Thanks Many Thanks

More information

Lattices and Lattice Codes

Lattices and Lattice Codes Lattices and Lattice Codes Trivandrum School on Communication, Coding & Networking January 27 30, 2017 Lakshmi Prasad Natarajan Dept. of Electrical Engineering Indian Institute of Technology Hyderabad

More information

FULL rate and full diversity codes for the coherent

FULL rate and full diversity codes for the coherent 1432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 4, APRIL 2005 The Golden Code: A 2 2 Full-Rate Space Time Code With Nonvanishing Determinants Jean-Claude Belfiore, Member, IEEE, Ghaya Rekaya,

More information

On Linear Subspace Codes Closed under Intersection

On Linear Subspace Codes Closed under Intersection On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F

More information

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9 Problem Set 1 These questions are based on the material in Section 1: Introduction to coding theory. You do not need to submit your answers to any of these questions. 1. The following ISBN was received

More information

Error control of line codes generated by finite Coxeter groups

Error control of line codes generated by finite Coxeter groups Error control of line codes generated by finite Coxeter groups Ezio Biglieri Universitat Pompeu Fabra, Barcelona, Spain Email: e.biglieri@ieee.org Emanuele Viterbo Monash University, Melbourne, Australia

More information

The E8 Lattice and Error Correction in Multi-Level Flash Memory

The E8 Lattice and Error Correction in Multi-Level Flash Memory The E8 Lattice and Error Correction in Multi-Level Flash Memory Brian M Kurkoski University of Electro-Communications Tokyo, Japan kurkoski@iceuecacjp Abstract A construction using the E8 lattice and Reed-Solomon

More information

Algebraic Structures Exam File Fall 2013 Exam #1

Algebraic Structures Exam File Fall 2013 Exam #1 Algebraic Structures Exam File Fall 2013 Exam #1 1.) Find all four solutions to the equation x 4 + 16 = 0. Give your answers as complex numbers in standard form, a + bi. 2.) Do the following. a.) Write

More information

Codes for Partially Stuck-at Memory Cells

Codes for Partially Stuck-at Memory Cells 1 Codes for Partially Stuck-at Memory Cells Antonia Wachter-Zeh and Eitan Yaakobi Department of Computer Science Technion Israel Institute of Technology, Haifa, Israel Email: {antonia, yaakobi@cs.technion.ac.il

More information

New Trellis Codes Based on Lattices and Cosets *

New Trellis Codes Based on Lattices and Cosets * New Trellis Codes Based on Lattices and Cosets * A. R. Calderbank and N. J. A. Sloane Mathematical Sciences Research Center AT&T Bell Laboratories Murray Hill, NJ 07974 ABSTRACT A new technique is proposed

More information

Extended 1-perfect additive codes

Extended 1-perfect additive codes Extended 1-perfect additive codes J.Borges, K.T.Phelps, J.Rifà 7/05/2002 Abstract A binary extended 1-perfect code of length n + 1 = 2 t is additive if it is a subgroup of Z α 2 Zβ 4. The punctured code

More information

MATH 433 Applied Algebra Lecture 22: Review for Exam 2.

MATH 433 Applied Algebra Lecture 22: Review for Exam 2. MATH 433 Applied Algebra Lecture 22: Review for Exam 2. Topics for Exam 2 Permutations Cycles, transpositions Cycle decomposition of a permutation Order of a permutation Sign of a permutation Symmetric

More information

Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm

Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm MARC A. ARMAND WEE SIEW YEN Department of Electrical & Computer Engineering National University

More information

Minimum-Distance Based Construction of Multi-Kernel Polar Codes

Minimum-Distance Based Construction of Multi-Kernel Polar Codes Minimum-Distance Based Construction of Multi-Kernel Polar Codes Valerio Bioglio, Frédéric Gabry, Ingmar Land, Jean-Claude Belfiore Mathematical and Algorithmic Sciences Lab France Research Center, Huawei

More information

MATH3302. Coding and Cryptography. Coding Theory

MATH3302. Coding and Cryptography. Coding Theory MATH3302 Coding and Cryptography Coding Theory 2010 Contents 1 Introduction to coding theory 2 1.1 Introduction.......................................... 2 1.2 Basic definitions and assumptions..............................

More information

Probability Bounds for Two-Dimensional Algebraic Lattice Codes

Probability Bounds for Two-Dimensional Algebraic Lattice Codes Noname manuscript No. (will be inserted by the editor) Probability Bounds for Two-Dimensional Algebraic Lattice Codes David A. Karpuk, Member, IEEE Camilla Hollanti, Member, IEEE Emanuele Viterbo, Fellow,

More information

MATH32031: Coding Theory Part 15: Summary

MATH32031: Coding Theory Part 15: Summary MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,

More information

PD-sets for (nonlinear) Hadamard Z4 -linear codes

PD-sets for (nonlinear) Hadamard Z4 -linear codes This is the accepted versión of: Barrolleta, RD and Villanueva, M. PD-sets for (nonlinear) Hadamard Z₄-linear codes in Springer Proceedings in Mathematics & Statistics, 2016 (Proceedings of the 21st Conference

More information

The Cosets Code. Aubrey Neumann. Summer 2010

The Cosets Code. Aubrey Neumann. Summer 2010 The Cosets Code Aubrey Neumann Summer 2010 1 Introduction This paper will propose a new binary linear code, determine its fundamental properties and explore the effectiveness single iteration voting decoding.

More information

Open problems on cyclic codes

Open problems on cyclic codes Open problems on cyclic codes Pascale Charpin Contents 1 Introduction 3 2 Different kinds of cyclic codes. 4 2.1 Notation.............................. 5 2.2 Definitions............................. 6

More information

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane 2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and

More information

Reed-Muller Codes. Sebastian Raaphorst Carleton University

Reed-Muller Codes. Sebastian Raaphorst Carleton University Reed-Muller Codes Sebastian Raaphorst Carleton University May 9, 2003 Abstract This paper examines the family of codes known as Reed-Muller codes. We begin by briefly introducing the codes and their history

More information

A Singleton Bound for Lattice Schemes

A Singleton Bound for Lattice Schemes 1 A Singleton Bound for Lattice Schemes Srikanth B. Pai, B. Sundar Rajan, Fellow, IEEE Abstract arxiv:1301.6456v4 [cs.it] 16 Jun 2015 In this paper, we derive a Singleton bound for lattice schemes and

More information

On the Performance of. Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels

On the Performance of. Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels On the Performance of 1 Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels arxiv:0711.1295v1 [cs.it] 8 Nov 2007 Emanuele Viterbo and Yi Hong Abstract The Golden space-time trellis

More information

Codes and Rings: Theory and Practice

Codes and Rings: Theory and Practice Codes and Rings: Theory and Practice Patrick Solé CNRS/LAGA Paris, France, January 2017 Geometry of codes : the music of spheres R = a finite ring with identity. A linear code of length n over a ring R

More information

General error locator polynomials for binary cyclic codes with t 2 and n < 63

General error locator polynomials for binary cyclic codes with t 2 and n < 63 General error locator polynomials for binary cyclic codes with t 2 and n < 63 April 22, 2005 Teo Mora (theomora@disi.unige.it) Department of Mathematics, University of Genoa, Italy. Emmanuela Orsini (orsini@posso.dm.unipi.it)

More information

Practical Polar Code Construction Using Generalised Generator Matrices

Practical Polar Code Construction Using Generalised Generator Matrices Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:

More information

Construction and Encoding of QC-LDPC Codes Using Group Rings

Construction and Encoding of QC-LDPC Codes Using Group Rings 1 Construction and Encoding of QC-LDPC Codes Using Group Rings Hassan Khodaiemehr and Dariush Kiani arxiv:1701.00210v1 [cs.it] 1 Jan 2017 Abstract Quasi-cyclic (QC) low-density parity-check (LDPC) codes

More information

Open Questions in Coding Theory

Open Questions in Coding Theory Open Questions in Coding Theory Steven T. Dougherty July 4, 2013 Open Questions The following questions were posed by: S.T. Dougherty J.L. Kim P. Solé J. Wood Hilbert Style Problems Hilbert Style Problems

More information

EE 229B ERROR CONTROL CODING Spring 2005

EE 229B ERROR CONTROL CODING Spring 2005 EE 229B ERROR CONTROL CODING Spring 2005 Solutions for Homework 1 1. Is there room? Prove or disprove : There is a (12,7) binary linear code with d min = 5. If there were a (12,7) binary linear code with

More information

IN this paper, we will introduce a new class of codes,

IN this paper, we will introduce a new class of codes, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 44, NO 5, SEPTEMBER 1998 1861 Subspace Subcodes of Reed Solomon Codes Masayuki Hattori, Member, IEEE, Robert J McEliece, Fellow, IEEE, and Gustave Solomon,

More information

Chapter 2. Error Correcting Codes. 2.1 Basic Notions

Chapter 2. Error Correcting Codes. 2.1 Basic Notions Chapter 2 Error Correcting Codes The identification number schemes we discussed in the previous chapter give us the ability to determine if an error has been made in recording or transmitting information.

More information

Chapter 6 Lagrange Codes

Chapter 6 Lagrange Codes Chapter 6 Lagrange Codes 6. Introduction Joseph Louis Lagrange was a famous eighteenth century Italian mathematician [] credited with minimum degree polynomial interpolation amongst his many other achievements.

More information

LIFTED CODES OVER FINITE CHAIN RINGS

LIFTED CODES OVER FINITE CHAIN RINGS Math. J. Okayama Univ. 53 (2011), 39 53 LIFTED CODES OVER FINITE CHAIN RINGS Steven T. Dougherty, Hongwei Liu and Young Ho Park Abstract. In this paper, we study lifted codes over finite chain rings. We

More information

Can You Hear Me Now?

Can You Hear Me Now? Can You Hear Me Now? An Introduction to Coding Theory William J. Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 19 October 2004 W. J. Turner (Wabash College)

More information

Introduction to binary block codes

Introduction to binary block codes 58 Chapter 6 Introduction to binary block codes In this chapter we begin to study binary signal constellations, which are the Euclidean-space images of binary block codes. Such constellations have nominal

More information

Polar Codes: Graph Representation and Duality

Polar Codes: Graph Representation and Duality Polar Codes: Graph Representation and Duality arxiv:1312.0372v1 [cs.it] 2 Dec 2013 M. Fossorier ETIS ENSEA/UCP/CNRS UMR-8051 6, avenue du Ponceau, 95014, Cergy Pontoise, France Email: mfossorier@ieee.org

More information

Some Sieving Algorithms for Lattice Problems

Some Sieving Algorithms for Lattice Problems Foundations of Software Technology and Theoretical Computer Science (Bangalore) 2008. Editors: R. Hariharan, M. Mukund, V. Vinay; pp - Some Sieving Algorithms for Lattice Problems V. Arvind and Pushkar

More information

Linear, Cyclic and Constacyclic Codes over S 4 = F 2 + uf 2 + u 2 F 2 + u 3 F 2

Linear, Cyclic and Constacyclic Codes over S 4 = F 2 + uf 2 + u 2 F 2 + u 3 F 2 Filomat 28:5 (2014), 897 906 DOI 10.2298/FIL1405897O Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Linear, Cyclic and Constacyclic

More information

Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes

Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes Introduction to Coding Theory CMU: Spring 010 Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes April 010 Lecturer: Venkatesan Guruswami Scribe: Venkat Guruswami & Ali Kemal Sinop DRAFT

More information

New algebraic decoding method for the (41, 21,9) quadratic residue code

New algebraic decoding method for the (41, 21,9) quadratic residue code New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,

More information

Reed Muller Error Correcting Codes

Reed Muller Error Correcting Codes Reed Muller Error Correcting Codes Ben Cooke Abstract. This paper starts by defining key terms and operations used with Reed Muller codes and binary numbers. Reed Muller codes are then defined and encoding

More information

Sphere Packings, Coverings and Lattices

Sphere Packings, Coverings and Lattices Sphere Packings, Coverings and Lattices Anja Stein Supervised by: Prof Christopher Smyth September, 06 Abstract This article is the result of six weeks of research for a Summer Project undertaken at the

More information

REED-SOLOMON CODE SYMBOL AVOIDANCE

REED-SOLOMON CODE SYMBOL AVOIDANCE Vol105(1) March 2014 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 13 REED-SOLOMON CODE SYMBOL AVOIDANCE T Shongwe and A J Han Vinck Department of Electrical and Electronic Engineering Science, University

More information

Lecture Introduction. 2 Linear codes. CS CTT Current Topics in Theoretical CS Oct 4, 2012

Lecture Introduction. 2 Linear codes. CS CTT Current Topics in Theoretical CS Oct 4, 2012 CS 59000 CTT Current Topics in Theoretical CS Oct 4, 01 Lecturer: Elena Grigorescu Lecture 14 Scribe: Selvakumaran Vadivelmurugan 1 Introduction We introduced error-correcting codes and linear codes in

More information

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

NOTES ON FINITE FIELDS

NOTES ON FINITE FIELDS NOTES ON FINITE FIELDS AARON LANDESMAN CONTENTS 1. Introduction to finite fields 2 2. Definition and constructions of fields 3 2.1. The definition of a field 3 2.2. Constructing field extensions by adjoining

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields

More information

On Random Rotations Diversity. Motorola Semiconductors Toulouse, France. ENST, 46 rue Barrault Paris, France. November 19, 1999.

On Random Rotations Diversity. Motorola Semiconductors Toulouse, France. ENST, 46 rue Barrault Paris, France. November 19, 1999. On Random Rotations Diversity and Minimum MSE Decoding of Lattices Catherine LAMY y - Joseph BOUTROS z y Motorola Semiconductors Toulouse, France z ENST, 46 rue Barrault 75013 Paris, France lamyc@enst.fr,

More information

The E8 Lattice and Error Correction in Multi-Level Flash Memory

The E8 Lattice and Error Correction in Multi-Level Flash Memory The E8 Lattice and Error Correction in Multi-Level Flash Memory Brian M. Kurkoski kurkoski@ice.uec.ac.jp University of Electro-Communications Tokyo, Japan ICC 2011 IEEE International Conference on Communications

More information

Coding on a Trellis: Convolutional Codes

Coding on a Trellis: Convolutional Codes .... Coding on a Trellis: Convolutional Codes Telecommunications Laboratory Alex Balatsoukas-Stimming Technical University of Crete November 6th, 2008 Telecommunications Laboratory (TUC) Coding on a Trellis:

More information

Some Goodness Properties of LDA Lattices

Some Goodness Properties of LDA Lattices Some Goodness Properties of LDA Lattices Shashank Vatedka and Navin Kashyap {shashank,nkashyap}@eceiiscernetin Department of ECE Indian Institute of Science Bangalore, India Information Theory Workshop

More information

Linear Codes, Target Function Classes, and Network Computing Capacity

Linear Codes, Target Function Classes, and Network Computing Capacity Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:

More information

ENTRY GROUP THEORY. [ENTRY GROUP THEORY] Authors: started Mark Lezama: October 2003 Literature: Algebra by Michael Artin, Mathworld.

ENTRY GROUP THEORY. [ENTRY GROUP THEORY] Authors: started Mark Lezama: October 2003 Literature: Algebra by Michael Artin, Mathworld. ENTRY GROUP THEORY [ENTRY GROUP THEORY] Authors: started Mark Lezama: October 2003 Literature: Algebra by Michael Artin, Mathworld Group theory [Group theory] is studies algebraic objects called groups.

More information

CSIR - Algebra Problems

CSIR - Algebra Problems CSIR - Algebra Problems N. Annamalai DST - INSPIRE Fellow (SRF) Department of Mathematics Bharathidasan University Tiruchirappalli -620024 E-mail: algebra.annamalai@gmail.com Website: https://annamalaimaths.wordpress.com

More information

LDPC codes based on Steiner quadruple systems and permutation matrices

LDPC codes based on Steiner quadruple systems and permutation matrices Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory September 7 13, 2014, Svetlogorsk (Kaliningrad region), Russia pp. 175 180 LDPC codes based on Steiner quadruple systems and

More information

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Shu Lin, Shumei Song, Lan Lan, Lingqi Zeng and Ying Y Tai Department of Electrical & Computer Engineering University of California,

More information

The spectra of super line multigraphs

The spectra of super line multigraphs The spectra of super line multigraphs Jay Bagga Department of Computer Science Ball State University Muncie, IN jbagga@bsuedu Robert B Ellis Department of Applied Mathematics Illinois Institute of Technology

More information

Permuted Successive Cancellation Decoder for Polar Codes

Permuted Successive Cancellation Decoder for Polar Codes Permuted Successive Cancellation Decoder for Polar Codes Harish Vangala, Emanuele Viterbo, and Yi Hong, Dept. of ECSE, Monash University, Melbourne, VIC 3800, Australia. Email: {harish.vangala, emanuele.viterbo,

More information

Polar Codes for Sources with Finite Reconstruction Alphabets

Polar Codes for Sources with Finite Reconstruction Alphabets Polar Codes for Sources with Finite Reconstruction Alphabets Aria G. Sahebi and S. Sandeep Pradhan Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI 4809,

More information

for some error exponent E( R) as a function R,

for some error exponent E( R) as a function R, . Capacity-achieving codes via Forney concatenation Shannon s Noisy Channel Theorem assures us the existence of capacity-achieving codes. However, exhaustive search for the code has double-exponential

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

Section 3 Error Correcting Codes (ECC): Fundamentals

Section 3 Error Correcting Codes (ECC): Fundamentals Section 3 Error Correcting Codes (ECC): Fundamentals Communication systems and channel models Definition and examples of ECCs Distance For the contents relevant to distance, Lin & Xing s book, Chapter

More information

Random Redundant Soft-In Soft-Out Decoding of Linear Block Codes

Random Redundant Soft-In Soft-Out Decoding of Linear Block Codes Random Redundant Soft-In Soft-Out Decoding of Linear Block Codes Thomas R. Halford and Keith M. Chugg Communication Sciences Institute University of Southern California Los Angeles, CA 90089-2565 Abstract

More information

Mathematics for Cryptography

Mathematics for Cryptography Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1

More information

Bounds on fast decodability of space-time block codes, skew-hermitian matrices, and Azumaya algebras

Bounds on fast decodability of space-time block codes, skew-hermitian matrices, and Azumaya algebras Bounds on fast decodability of space-time block codes, skew-hermitian matrices, and Azumaya algebras Grégory Berhuy, Nadya Markin, and B. A. Sethuraman 1 Abstract We study fast lattice decodability of

More information

4F5: Advanced Communications and Coding

4F5: Advanced Communications and Coding 4F5: Advanced Communications and Coding Coding Handout 4: Reed Solomon Codes Jossy Sayir Signal Processing and Communications Lab Department of Engineering University of Cambridge jossy.sayir@eng.cam.ac.uk

More information

Error Detection and Correction: Hamming Code; Reed-Muller Code

Error Detection and Correction: Hamming Code; Reed-Muller Code Error Detection and Correction: Hamming Code; Reed-Muller Code Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Hamming Code: Motivation

More information

Critical Groups of Graphs with Dihedral Symmetry

Critical Groups of Graphs with Dihedral Symmetry Critical Groups of Graphs with Dihedral Symmetry Will Dana, David Jekel August 13, 2017 1 Introduction We will consider the critical group of a graph Γ with an action by the dihedral group D n. After defining

More information

Maximum exponent of boolean circulant matrices with constant number of nonzero entries in its generating vector

Maximum exponent of boolean circulant matrices with constant number of nonzero entries in its generating vector Maximum exponent of boolean circulant matrices with constant number of nonzero entries in its generating vector MI Bueno, Department of Mathematics and The College of Creative Studies University of California,

More information

Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel

Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Brian M. Kurkoski, Paul H. Siegel, and Jack K. Wolf Department of Electrical and Computer Engineering

More information

Binary Convolutional Codes of High Rate Øyvind Ytrehus

Binary Convolutional Codes of High Rate Øyvind Ytrehus Binary Convolutional Codes of High Rate Øyvind Ytrehus Abstract The function N(r; ; d free ), defined as the maximum n such that there exists a binary convolutional code of block length n, dimension n

More information

4184 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Pranav Dayal, Member, IEEE, and Mahesh K. Varanasi, Senior Member, IEEE

4184 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Pranav Dayal, Member, IEEE, and Mahesh K. Varanasi, Senior Member, IEEE 4184 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER 2005 An Algebraic Family of Complex Lattices for Fading Channels With Application to Space Time Codes Pranav Dayal, Member, IEEE,

More information

On the Construction and Decoding of Cyclic LDPC Codes

On the Construction and Decoding of Cyclic LDPC Codes On the Construction and Decoding of Cyclic LDPC Codes Chao Chen Joint work with Prof. Baoming Bai from Xidian University April 30, 2014 Outline 1. Introduction 2. Construction based on Idempotents and

More information

EXHAUSTIVE DETERMINATION OF (511, 255, 127)-CYCLIC DIFFERENCE SETS

EXHAUSTIVE DETERMINATION OF (511, 255, 127)-CYCLIC DIFFERENCE SETS EXHAUSTIVE DETERMINATION OF (511, 255, 127)-CYCLIC DIFFERENCE SETS ROLAND B. DREIER AND KENNETH W. SMITH 1. Introduction In this paper we describe an exhaustive search for all cyclic difference sets with

More information

Chapter 7 Reed Solomon Codes and Binary Transmission

Chapter 7 Reed Solomon Codes and Binary Transmission Chapter 7 Reed Solomon Codes and Binary Transmission 7.1 Introduction Reed Solomon codes named after Reed and Solomon [9] following their publication in 1960 have been used together with hard decision

More information

Polynomial Multiplication over Finite Fields using Field Extensions and Interpolation

Polynomial Multiplication over Finite Fields using Field Extensions and Interpolation 009 19th IEEE International Symposium on Computer Arithmetic Polynomial Multiplication over Finite Fields using Field Extensions and Interpolation Murat Cenk Department of Mathematics and Computer Science

More information

Polynomials, Ideals, and Gröbner Bases

Polynomials, Ideals, and Gröbner Bases Polynomials, Ideals, and Gröbner Bases Notes by Bernd Sturmfels for the lecture on April 10, 2018, in the IMPRS Ringvorlesung Introduction to Nonlinear Algebra We fix a field K. Some examples of fields

More information

Joint Coding for Flash Memory Storage

Joint Coding for Flash Memory Storage ISIT 8, Toronto, Canada, July 6-11, 8 Joint Coding for Flash Memory Storage Anxiao (Andrew) Jiang Computer Science Department Texas A&M University College Station, TX 77843, U.S.A. ajiang@cs.tamu.edu Abstract

More information

Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor

Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor Pravin Salunkhe, Prof D.P Rathod Department of Electrical Engineering, Veermata Jijabai

More information

A Projection Decoding of a Binary Extremal Self-Dual Code of Length 40

A Projection Decoding of a Binary Extremal Self-Dual Code of Length 40 A Projection Decoding of a Binary Extremal Self-Dual Code of Length 4 arxiv:7.48v [cs.it] 6 Jan 27 Jon-Lark Kim Department of Mathematics Sogang University Seoul, 2-742, South Korea jlkim@sogang.ac.kr

More information

Golden Space-Time Block Coded Modulation

Golden Space-Time Block Coded Modulation Golden Space-Time Block Coded Modulation Laura Luzzi Ghaya Rekaya-Ben Othman Jean-Claude Belfiore and Emanuele Viterbo Télécom ParisTech- École Nationale Supérieure des Télécommunications 46 Rue Barrault

More information

Iterative Encoding of Low-Density Parity-Check Codes

Iterative Encoding of Low-Density Parity-Check Codes Iterative Encoding of Low-Density Parity-Check Codes David Haley, Alex Grant and John Buetefuer Institute for Telecommunications Research University of South Australia Mawson Lakes Blvd Mawson Lakes SA

More information

On Boolean functions which are bent and negabent

On Boolean functions which are bent and negabent On Boolean functions which are bent and negabent Matthew G. Parker 1 and Alexander Pott 2 1 The Selmer Center, Department of Informatics, University of Bergen, N-5020 Bergen, Norway 2 Institute for Algebra

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x]. The second exam will be on Friday, October 28, 2. It will cover Sections.7,.8, 3., 3.2, 3.4 (except 3.4.), 4. and 4.2 plus the handout on calculation of high powers of an integer modulo n via successive

More information

ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS

ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 4 (2004), #A21 ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS Sergey Kitaev Department of Mathematics, University of Kentucky,

More information

On Weight Enumerators and MacWilliams Identity for Convolutional Codes

On Weight Enumerators and MacWilliams Identity for Convolutional Codes On Weight Enumerators and MacWilliams Identity for Convolutional Codes Irina E Bocharova 1, Florian Hug, Rolf Johannesson, and Boris D Kudryashov 1 1 Dept of Information Systems St Petersburg Univ of Information

More information

Extended Binary Linear Codes from Legendre Sequences

Extended Binary Linear Codes from Legendre Sequences Extended Binary Linear Codes from Legendre Sequences T. Aaron Gulliver and Matthew G. Parker Abstract A construction based on Legendre sequences is presented for a doubly-extended binary linear code of

More information

Some practice problems for midterm 2

Some practice problems for midterm 2 Some practice problems for midterm 2 Kiumars Kaveh November 14, 2011 Problem: Let Z = {a G ax = xa, x G} be the center of a group G. Prove that Z is a normal subgroup of G. Solution: First we prove Z is

More information

Physical Layer and Coding

Physical Layer and Coding Physical Layer and Coding Muriel Médard Professor EECS Overview A variety of physical media: copper, free space, optical fiber Unified way of addressing signals at the input and the output of these media:

More information

A multiplicative deformation of the Möbius function for the poset of partitions of a multiset

A multiplicative deformation of the Möbius function for the poset of partitions of a multiset Contemporary Mathematics A multiplicative deformation of the Möbius function for the poset of partitions of a multiset Patricia Hersh and Robert Kleinberg Abstract. The Möbius function of a partially ordered

More information