Bounds for binary codes with narrow distance distributions

Size: px
Start display at page:

Download "Bounds for binary codes with narrow distance distributions"

Transcription

1 Bounds for binary codes with narrow distance distributions Ron M Roth, Gadiel Seroussi Advanced Studies HP Laboratories Palo Alto HPL September 9, 006* constant-weight codes, distance distribution, equidistant codes, linear programming bound New lower bounds are presented on the second moment of the distance distribution of binary codes, in terms of the first moment of the distribution These bounds are used to obtain upper bounds on the size of codes whose maximum distance is close to their minimum distance It is then demonstrated how such bounds can be applied to bound from below the smallest attainable ratio between the maximum distance and the minimum distance of codes Finally, counterparts of the bounds are derived for the special case of constant-weight codes * Internal Accession Date Only Approved for External Publication Copyright 006 Hewlett-Packard Development Company, LP

2 Bounds for binary codes with narrow distance distributions Ron M Roth Gadiel Seroussi September 18, 006 Abstract New lower bounds are presented on the second moment of the distance distribution of binary codes, in terms of the first moment of the distribution These bounds are used to obtain upper bounds on the size of codes whose maximum distance is close to their minimum distance It is then demonstrated how such bounds can be applied to bound from below the smallest attainable ratio between the maximum distance and the minimum distance of codes Finally, counterparts of the bounds are derived for the special case of constant-weight codes Keywords: Constant-weight codes; Distance distribution; Equidistant codes; Grey Rankin bound; Linear programming bound; Quasi-symmetric designs; Selfcomplementary codes 1 Introduction Let C be an n, M, d) binary code of length n, size M > 1, and minimum Hamming distance d) The distance distribution of C is a list B 0 B 1 B n ), where B i is the average over all This work was done in part while both authors were at Hewlett-Packard Laboratories, 1501 Page Mill Road, Palo Alto, CA 930, USA This work was supported in part by grant No from the United- States Israel Binational Science Foundation BSF), Jerusalem, Israel This work was presented in part under a different title) at the IEEE International Symposium on Information Theory ISIT 005), Adelaide, Australia September 005), pp in the proceedings Computer Science Department, Technion, Haifa 3000, Israel ronny@cstechnionacil Mathematical Sciences Research Institute MSRI), 17 Gauss Way, Berkeley CA 970, USA gadiel@msriorg 1

3 codewords c C of the number of codewords at Hamming distance i from c; that is, if d, ) denotes Hamming distance, then B i = 1 {c C : dc, c ) = i}, 0 i n M Equivalently, c C Clearly, B 0 = 1 and B i = 0 when 0 < i < d B i = 1 M {c, c ) C C : dc, c ) = i} Define β i = B i /M for 0 i n Then β i ) n is the probability measure on the distances in C that is induced by assuming a uniform distribution on the codewords of C In particular, E C = iβ i is the average distance between any two codewords in C, and S C = i β i is the second moment of the distances It is known that E C is bounded from above by n/ in fact, this is the basis of the proof of the Plotkin bound: see [9, pp 1 ]) In this work, we obtain a new lower bound on the second moment S C, in terms of the code parameters n and M and the average E C This bound will be presented in Section 3 and a counterpart of that bound for constant-weight codes will be presented in Section 5) There are known bounds on the moments of codes, obtained from MacWilliams identities, the Delsarte linear programming DLP) bound, and enhancements thereof: see [1], [], [3], [9, Sections 5 and 17] We show that there is a range of code parameters for which the bound we present here is not implied by these techniques As an application of our new lower bound, we present in Section an upper bound on the size M of a binary code C, in terms of its length n, minimum distance d, and the maximum distance d max between any two codewords in C The effectiveness of our bound can be seen in cases where d max is close to d, ie, when the distance distribution of the code is required to be narrow As a concrete practical motivation for studying such codes, we refer the reader to [8], where it is demonstrated how binary constant-weight codes with narrow distance distribution can be incorporated into the design of demultiplexers for nano-scale memories The following definition will be useful throughout this work Let A = AC) be an M n real matrix whose rows are indexed by the codewords of C, and the row of A that is indexed by c is given by A) c = c 1 ;

4 here 1 denotes the real all-one vector of length n and the codeword c is regarded as an integer vector over {0, 1} n thus, the entries of A are in { 1, +1}) For i = 0, 1,, n, denote by E i the M M matrix whose rows and columns are indexed by the codewords of C, and for every c, c C, { 1 if dc, c E i ) c,c = ) = i 0 otherwise Let J denote the M M all-one matrix Clearly, we have E 0 = I and n E i = J It follows that AA T = n i) E i = n J i E i 1) Example 11 An n, M, d) binary code C is equidistant if B i 0 only if i {0, d} For equidistant codes we have I if i = 0 E i = J I if i = d 0 otherwise and, so, i=1 AA T = n d) J + d) I ) Bound on the size of equidistant codes In this section, we present an upper bound on the size of equidistant codes At first sight, this result might not seem to be related to the problem of bounding the second moment of the distances However, the proof technique that we use here bears a common ground with the analyses in subsequent sections, through the properties of the matrix AA T in 1) Recall that the Plotkin bound states that for every n, M, d) binary code C for which n < d, M d d n, and equality can be attained only if C is equidistant see [9, pp 1 ]) Proposition 1 Let C be an equidistant n, M, d) binary code Then M n+1, and equality holds if and only if n = d 1 and C attains the Plotkin bound Proof The if part is straightforward: when n = d 1 and C attains the Plotkin bound, then M = d = d = n+1 d n 3

5 Turning to the only if part, the proof is similar to that of Fisher s inequality in block designs see [, p 81] or [9, p 6]) Specifically, we compute the rank of the matrix AA T in two ways On the one hand, rankaa T ) = ranka) n 3) On the other hand, we see from ) that the eigenvalues of AA T multiplicity 1) and d with multiplicity M 1) Therefore, are d + Mn d) with { M 1 if d + Mn d) = 0 rankaa T ) = M otherwise ) We conclude from 3) and ) that M 1 n, with equality holding only if d+mn d) = 0 In case of equality we have n+1 = M = d d n, and it can be readily seen that d/d n) may exceed n only when n = d 1 The bound in Proposition 1 is attained by Hadamard codes [9, Section 3] The n>3, M=n, d=) code that consists of all binary words of length n and Hamming weight 1 is equidistant and its size is the largest possible for its length, given that n > d 1 See Tonchev [11, Section ] and the references therein) for conditions on the existence of equidistant codes that meet the Plotkin bound A characterization of all linear equidistant codes can be found in Bonisoli [5] 3 Bound on the second moment For a real M M matrix Y = y i,j ) M i=1 M j=1, denote by TrY ) its trace and by Y F Frobenius norm, ie, M M 1/ Y F = yi,j) It is easy to verify that i=1 j=1 Y F = TrY ) We make use of the following theorem, which shows the effect on the eigenvalues of a given real symmetric matrix X, caused by subtracting from X a nonnegative definite symmetric matrix of rank 1 see Wilkinson [1, pp 9 97]) Theorem 31 Let X be a real symmetric M M matrix with eigenvalues λ 1 λ λ M and let v be a real row vector of length M Define the matrix Y by Y = X v T v, its

6 and let µ 1 µ µ M be the eigenvalues of Y Then, for r = 1,,, M 1, λ r+1 µ r λ r, and µ M λ M Proposition 3 Let M β i ) n be the distance distribution of an n, M n, d) binary code Then for every nonnegative real γ n/, Proof From 1) we have, i γ) β i γ n AA T = n γ) J + γ i) E i and, so, M i γ) β i = γ i) E i F = AA T n γ) J F 5) In what follows, we bound from below the right-hand side of 5) To this end, we apply Theorem 31 to the symmetric matrix X = AA T and the vector Then, v = n γ ) Y = AA T n γ) J, 6) and the right-hand side of 5) equals Y F = TrY ) Note also that TrY ) = Mγ The matrix X = AA T is nonnegative definite ie, λ M 0), and rankx) = ranka) n; hence, λ n+1 = λ n+ = = λ M = 0 Therefore, by Theorem 31, the eigenvalues of Y satisfy µ n+1 = µ n+ = = µ M 1 = 0 7) and µ M 0 8) 5

7 From 7) 8) it follows that µ r r=1 M µ r = TrY ) = Mγ 0) r=1 Thus, Y F = TrY ) = M µ r r=1 µ r 1 ) M γ µ r n n r=1 where the penultimate inequality follows from the convexity of z z ) The result is now obtained by combining 5), 6), and 9) r=1 9) Theorem 33 Let C be an n, M n, d) binary code Then ne C if E C S C ne C n) if < E C n Proof We observe that i γ) β i = S C γe C + γ, and by Proposition 3 we thus get S C γe C n γ, 10) for every real γ n/ The right-hand side of 10) attains its maximum at ne C if E C γ = n if < E C n, and the result is obtained by substituting this maximizing value of γ into 10) We point out that the inequality S C ne C n) 11) 6

8 obtained by substituting γ = n/ in Proposition 3) is implied by the DLP bound To see this, recall that MacWilliams identities relate the distance distribution B i ) n to its MacWilliams transform B l )n l=0 by B l = 1 M K l i; n) B i, 0 l n, 1) where K l x; n) = l ) ) x n x 1) j, 0 l n j l j j=0 The DLP bound on the code size is then given as the largest attainable value of the sum B 0 + B B n = M), where B i ) n ranges over all nonnegative rational vectors whose MacWilliams transform satisfies the following constraints: B l 0, 0 l n 13) strictly speaking, the rational entries B i should also be such that their sum M is one of their integer common denominators) For l = we have ) n K x; n) = x nx + and, so, thereby yielding 11) 0 B = S C ne C + ) n, From this analysis it follows that when E C )/ eg, when C is a linear code with no all-zero coordinates), Theorem 33 offers no improvement over the DLP bound However, as we see in the sequel, there are instances where Theorem 33 implies a stronger bound than the DLP bound Note that Theorem 33 is at least as strong as Proposition 3, for any γ n/: Proposition 3 is equivalent to the linear constraint 10) on S C and E C for any fixed γ, while Theorem 33 is the intersection or the envelope) of the constraints 10) over all γ n/ The advantage in having the individual linear constraints 10) available is that they can be incorporated into any bounding technique that uses linear programming A qualitative) illustration of the bound of Theorem 33 is shown Figure 1 The curve changes from quadratic to linear in E C at the point E C, S C ) =, n) ): note that it is the quadratic region where the theorem strictly improves on the DLP-implied bound 11) 7

9 S C n, nn+1) ), n) ) Theorem 33 Equation 11) E C E C 1 Figure 1: Bounds on S C in terms of E C E C The figure is, in fact, drawn to scale for the length value n = 5; as such, it exaggerates the proportions of the linear region of the bound For larger n, the proportions change in favor of the quadratic region) For reference, we have also included in the figure the curve E C E C : the inequality S C E C must hold just from the fact that β i) n is a probability measure Bounds for narrow distance distributions Theorem 33 can be used to obtain bounds on the parameters of codes whose distance distributions are limited to a narrow range of distances Specifically, let C be an n, M, d) binary code and denote by d max the maximum distance between any two codewords in C We will be interested in cases where d max is close to d Equidistant codes are an extreme case where d max = d The next proposition yields an upper bound on the code size M, in terms of n, d, and d max 8

10 Proposition 1 Let C be an n, M, d) binary code with maximum distance d max Denote by d a and d g the arithmetic and geometric means, respectively, of d and d max ; ie, Then 1 1 M d a = d max + d 1 1 ) da ) n d g n d a n+1 ) d g and d g = d max d if d a {n+1, n+} if d a {n+1, n+} Proof For d max = d, the result follows from Proposition 1 In addition, the result can be easily verified to hold for the values n =, d = 1, and d max = Therefore, we assume hereafter in the proof that n 3 and d max > d For fixed value of E C, the second moment S C attains its maximum when the distance distribution is concentrated at the boundary distance values, ie, when β i 0 only for i {0, d, d max } In our proof, we apply Theorem 33 to this extreme worst case) distribution Assuming such a distribution, write v = β dmax ; then β d = 1 1/M) v and, so, E C = d 1 1 ) M v + d max v = d 1 1 ) + d max d)v, M or Similarly, d max d)v = E C d 1 1 ) 1) M S C = d 1 1 ) M v + d max v = d 1 1 ) + d max M d )v = d 1 1 ) + d max + d) M = d a E C d g 1 1 ), M E C d 1 1 ) ) M where the third equality follows from 1) We now distinguish between two cases Case 1: E C )/ By Theorem 33 we have ne C d ae C + d g 1 1 ) = ne C M S C 0 15) 9

11 This inequality has a solution for E C only if the discriminant of the quadratic expression in E C ) in 15) is nonnegative, namely, which is the same as or d a d g n 1 1 ) 0, M 1 1 M 1 1 ) da ) 16) n d g Case : E C > )/ We again apply Theorem 33 to obtain ne C n) d a E C + d g 1 1 M 1 d g 1 1 ) = ne C n) S C 0, M d a n)e C + n) ) 17) For d a n/, we bound from above the right-hand side of 17) by replacing E C with )/; this yields 1 1 M 1 d d a ) n) ) 18) g Similarly, for d a > n/, we get the next bound from 17) by substituting E C for n/: 1 1 M 1 d d a n nn+1) ) 19) g A simple check reveals that the right-hand side of 18) is never greater than the righthand side of 16); this means that the bound 16) prevails for d a n/ On the other hand, the right-hand side of 19) exceeds that of 16) whenever n < d a < nn+1) ; 0) observing that n+ < nn+1)/) n+3 for n 3, we conclude from 0) that when d a {n+1, n+}, the upper bound on 1 1/M) is dictated by 19) Remark Since the last proof is based on putting the distribution mass on the extreme distance values, Proposition 1 is useful when d max is bounded away from n; otherwise, our strategy would be too pessimistic For example, it is easy to see that in every n, M, d) binary code, the tail of the distance distribution satisfies B i 1, i>n d/) 10

12 and taking this inequality into account, our bound can then be improved when d max > n d/) We next present two applications of Proposition 1; both take advantage of the fact that the proposition yields the strongest bound when the distance distribution is two-valued ie, the distribution is nonzero only at two nonzero distance values) The first application is an alternate proof of the Grey Rankin bound see [7] and [9, p 5]) Theorem The Grey Rankin bound) Let C be an n, M, d) binary code that is selfcomplementary, ie, if c is a codeword in C then so is the word that is obtained by changing each 1 in c into 0 and each 0 into 1 If n n)/ < d n/ then M 8dn d) n n d) Proof Let C be the n, M/, d ) code obtained by taking one codeword of C from each complementary pair The minimum distance d of C is at least d and its maximum distance d max is at most n d Let d a and d g be given by 1 d max + d ) and d g = d max d, respectively, and define the function z Qz) over the positive reals by Qz) = 1 z + 1 ) z + It is easy to verify that da ) d ) d ) = Q Q = d g d max n d n dn d), where the inequality follows from the fact that Qz) is a decreasing function for z 0, 1] By Proposition 1 we thus have 1 M 1 1 ) da ) 1 1 ) d ) Q = n) n d g n n d dn d), or The result follows ) M n n d) 8dn d) In our next application of Proposition 1, we consider the case where the equidistant property is slightly relaxed As is commonly done in bounds that are based on the distance distribution, we will limit ourselves to even-distant codes, namely, B i 0 only if i is even when d is even, this condition can be guaranteed simply by changing the last coordinate in each codeword of C into a parity bit; when d is odd, we apply the bounds to the n+1, M, d+1) code obtained by adding a parity bit as an n+1)st coordinate) An n, M, d) binary code C is called nearly-equidistant if it is even-distant and d max = d + 11

13 Proposition 3 Let C be a nearly-equidistant n, M, d) binary code Then the following holds i) If n d n/) 1 then M dd+)n d+1) n ii) If n/) 1 < d n+1)/ then n+3))/n 3) if d = )/ M n+ if d = n/ n+1 if d = n+1)/ Proof Part i) corresponds to the case where d a < n+1 in Proposition 1 Part ii) corresponds to the case where either d a {n+1, n+} or the Plotkin bound is attained Example 1 For n = 13 and d =, Proposition 3i) yields the upper bound M 6 This bound is attained by a certain 13, 6, ) binary code whose codewords all have Hamming weight 3 see Brouwer et al [6, Table I-A]); thus, this code is nearly-equidistant In comparison, the DLP bound yields M 0 for these parameters with a feasible solution B = 13 and B 6 = 6) Example The linear n=9, M=, d=) binary code that is generated by the matrix G = can be verified to be nearly-equidistant with minimum distance d = )/ = This code attains the bound in Proposition 3ii), which coincides with the DLP bound in this case Example 3 As shown in [9, p 59], by puncturing the binary simplex code, one can obtain linear nearly-equidistant n= m, M= m, d= m 1 ) binary codes; these codes attain the bound in Proposition 3ii), which again, as expected, coincides with the DLP bound For the code in Example 1 we have d a {n+1, n+}, while the codes in Examples and 3 satisfy d a {n+1, n+} The former therefore belongs to the first range of values of d a in Proposition 1, while the latter belong to the second range therein Each of these 1

14 examples attains the bound in Proposition 1 and violates the bound that corresponds to the range that it does not belong to This shows that the distinction between the two ranges of values of d a in Proposition 1 is necessary Table 1 shows the lower bounds on the length n, which are computed from Proposition 3 and the DLP bound, respectively, for nearly-equidistant n, M, d) binary codes with M = 6 and d =,, 6, 8, 10 the value 6 for M was selected to match the example in [8, Section ]) Note that for d =, the DLP bound yields a better bound than Proposition 3 d Proposition 3 DLP Bound Table 1: Lower bounds on the length n of nearly-equidistant n, M=6, d) binary codes There are coding applications where the parameters of interest are the code length n, size M, and the ratio d max /d rather than the specific values of d and d max ) One such application is the design of demultiplexers for nano-scale memory platforms, where M stands for the memory size and n is the number of address lines, and the goal is to have d max /d as small as possible [8] in this application, the codes are also required to be of the constant-weight type; we consider such codes in Section 5) Propositions 1 and 3 can be used to find a trade-off between the parameters n, M, and d max /d for even-distant codes, as demonstrated in the next example Example We find the largest even-distant binary code with n = 7 and d max /d = /3 From Proposition 3 it follows that every nearly-equidistant n=7, M, d=6) binary code has size M 58 in comparison, the DLP bound provides a feasible solution for M = 309) We next check the values d = 1 and d max = 16 In this case, either bound Proposition 1 or the DLP bound implies the upper bound M 6 There actually exists a linear n=7, M= 6, d=1) code with d max = 16: it is obtained by shortening a selfcomplementary linear 8, 7, 1) code which attains the Grey Rankin bound see Parker et al [10] and Tonchev [11, p 163]) The ratio d max /d = /3 can also be realized by d = 18 and d max =, yet by the Plotkin bound, the largest 7, M, 18) binary code has size M = Using Propositions 1 and 3 and the DLP bound combined), we have created Table : this table provides a lower bound on d max /d as a function of n, where we have taken the size M to be 6 13

15 Range of n d max /d 7 n n 13 1 n 17 5/3 18 n 3/ 3 n 6 7/5 7 n 3 /3 Table : Lower bounds on the ratio d max /d for even-distant n, M=6) binary codes, as a function of n The lower bounds in Table are known to be tight, except possibly for the penultimate row For n = 7 and therefore for every n 7), the ratio d max /d = 3 is attained by the 7, 6, ) parity code for n > 7 we just pad each codeword with a tail of n 7 zeros), and a ratio of d max /d = is attained by the 11, 7, ) code defined in [9, pp 70 71] By shortening the 16, 56, 6) Nordstrom Robinson code, we get a code that attains a ratio of 5/3 for n = 1 see [9, pp 73 7]); similarly, by shortening the extended binary Golay code one can obtain a linear 18, 6, 8) code with a ratio of 3/ Finally, the code described in Example attains a ratio of /3 for n = 7 As of yet, we do not know whether n = 3 is the smallest length for which a ratio of 7/5 is achievable 5 The constant-weight case An n, M, d) binary code C is called a constant-weight code if all the codewords in C have the same Hamming weight We then say that C is an n, M, d, w) code, where w is the Hamming weight of each codeword There is no loss of generality in assuming that w n/, and we will indeed assume this inequality throughout this section Constant-weight codes are always even-distant Proposition 3 can be slightly improved in the case of constant-weight codes, as we show next Proposition 51 Let M β i ) n be the distance distribution of an n, M n, d, w) code, and denote by θ the ratio w/n Then for every nonnegative real γ θ1 θ)n, i γ) β i γ Proof The proof is similar to that of Proposition 3, except that we re-define the M n 1

16 matrix A so that its rows are now given by A) c = c θ 1) the multiplier in this definition is not essential to derive our results: it is inserted only to make the definition here closer to the one in Section 1) It follows that for every codeword c C, A) c 1 T = c 1 T ) }{{} w θ 1 1 T ) = 0 }{{} n This implies that A1 T = 0, which readily means that ranka) Also, for any two codewords c and c, A) c A) T c = c θ 1) c θ 1) T c 1 T ) = c c T ) θ }{{} w dc,c ) } {{ } w = θ1 θ)n dc, c ) + 1 c T ) }{{} w ) θ 1 1 T ) }{{} n Hence, the counterparts of) Equations 1) and 5) become, respectively, and Here M AA T = θ1 θ)n i) E i = θ1 θ)n J i γ) β i = Next, we apply Theorem 31 to X = AA T and F i E i γ i) E i = AA T θ1 θ)n γ) J 1) F v = θ1 θ)n γ ) Y = AA T θ1 θ)n γ) J and, since rankx) = ranka), we get that ie, λ n is also zero); thus, 7) becomes and 8) still holds It follows that λ n = λ n+1 = = λ M = 0 µ n = µ n+1 = = µ M 1 = 0, i=1 µ r r=1 M µ r = TrY ) = Mγ 0) r=1 15

17 and, so, Y F = TrY ) r=1 µ r 1 Finally, we combine the latter equation with 1) r=1 µ r ) M γ Theorem 5 Let C be an n, M n, d, w) code and define α = αn, w) by α = w 1 w ) n Then S C n E C α E C n )α if E C n )α if n )α < E C α Proof Similarly to 10), we get from Proposition 51 that γ = S C γe C n γ, ) for every real γ α The right-hand side of ), in turn, attains its maximum at n E C if E C n )α α if E C > n )α The result is obtained by substituting this value of γ into ) and recalling the known fact that E C α see, eg, [9, pp 55 56], where this fact is used in proving the Johnson bound) We next compare Theorem 5 with the DLP bound for constant-weight codes counterpart of 1) for the constant-weight case is given by where B l = 1 M l The w E l i; n, w) B i, 0 l w, 3) ) ) ) w x n w x E l x; n, w) = j=0 x 1) j j l j l j ) ) w n w, 0 l w, l l 16

18 and the constraints 13) now become B l 0, 0 l w ) see [1, Proposition 16] and [9, p 665]) In particular, for l = we get ) ) n x αn, w) 1) x E x; n, w) = ) ) + 1 w n w and, so, ) ) w n w 0 16 B ) ) ) ) n w n w = S C α 1)E C + 16 ) = ) n )S C nα 1)E C + n α nα Hence, S C 1 ) nα 1)E C n α n + nα 5) A simple check reveals that the bound of Theorem 5 is stronger than 5) whenever E C < nα 1) n nα For larger values of E C, the bound 5) becomes tighter, until the bounds coincide again at E C = α When w = n/, the value of α is n/, in which case the bound 5) coincides with the bound of Theorem 5 whenever E C is in the range nn ) ) = n )α E C α = n ; this range is precisely where the bound of Theorem 5 is linear in E C Example 51 We consider the parameters n = 8 and d max /d = /3 By Theorem 5, the largest nearly-equidistant n=8, M, d=6, w) code has size M 63, and equality is possible only when w = For this value of w, the largest possible size M is attained when E C = α8, ) = 8/7, in which case Theorem 5 coincides with 5); therefore, for w =, Theorem 5 does not offer an improvement over the constant-weight DLP bound However, for larger values of w, Theorem 5 strictly improves on that DLP bound For example, 17

19 for w = 1, Equations 3) ) allow M = 80 as a feasible solution, while Theorem 5 bounds M from above by 58 Similarly, by combining Equations 3) ) with Theorem 5, we get that the largest n=8, M, d=1, w) code with d max = 16 has size M 63, and equality is possible only when w {11, 1} Equality is indeed attained by codes with w = 1 that are based on quasi-symmetric -designs [10], [11, p 163] Table 3 is the constant-weight counterpart of Table for code size M = 6) The first Range of n d max /d n = 8 9 n n 1 15 n 18 5/3 19 n 3 3/ n 8 7/5 9 n 3 /3 Table 3: Lower bounds on the ratio d max /d for n, M=6) constant-weight codes, as a function of n five rows in Table 3 present tight bounds Ratios of and 3, respectively, can be achieved by the trivial) 8, 70,, ) and 9, 8,, 3) codes A ratio of d max /d = is attained by the 11, 66,, 5) code that is based on the Steiner system S, 5, 11) [9, p 70], and a ratio of d max /d = 5/3 is attained by the 15, 70, 6, 6) code that consists of the codewords of Hamming weight 6 in the shortened 15, 18, 6) Nordstrom Robinson code [9, p 7] Finally, one can obtain a 19, 70, 8, 9) code with d max /d = 3/ by shortening, expurgating, and augmenting the set of codewords of Hamming weight 1 in the extended binary Golay code see the Appendix in [8]) Figure depicts the bounds of Theorem 5 and Equation 5), superimposed on Figure 1 Figure is drawn to scale for n = 5 and w = ) References [1] E Agrell, A Vardy, K Zeger, Upper bounds for constant-weight codes, IEEE Trans Inform Theory, 6 000), [] A Ashikhmin, A Barg, Binomial moments of the distance distribution: bounds and applications, IEEE Trans Inform Theory, ),

20 S C α, n α ) n, nn+1) ), n) ) Theorem 33 Equation 11) Theorem 5 E C E C Equation 5) 1 Figure : Bounds for the constant-weight case E C [3] A Ashikhmin, A Barg, S Litsyn, Estimates of the distance distribution of codes and designs, IEEE Trans Inform Theory, 7 001), [] T Beth, D Jungnickel, H Lenz, Design Theory, Cambridge University Press, Cambridge, 1986 [5] A Bonisoli, Every equidistant linear code is a sequence of dual Hamming codes, Ars Combinatoria, ), [6] AE Brouwer, JB Shearer, NJA Sloane, WD Smith, A new table of constant weight codes, IEEE Trans Inform Theory, ), [7] LD Grey, Some bounds for error-correcting codes, IRE Trans Inform Theory, 8 196), 00 0 and 355 [8] PJ Kuekes, W Robinett, RM Roth, G Seroussi, GS Snider, RS Williams, Resistor-logic demultiplexers for nanoelectronics based on constant-weight codes, Nanotechnology, ), [9] FJ MacWilliams, NJA Sloane, The Theory of Error-Correcting Codes, North- Holland, Amsterdam,

21 [10] C Parker, E Spence, VD Tonchev, Designs with the symmetric difference property on 6 points and their groups, J Comb Theory A, ), 3 3 [11] VD Tonchev, Codes and designs, in Handbook of Coding Theory, VS Pless, WC Huffman Editors), Elsevier, Amsterdam, 1998, pp [1] JH Wilkinson, The Algebraic Eigenvalue Problem, Clarendon Press, Oxford,

Improved Upper Bounds on Sizes of Codes

Improved Upper Bounds on Sizes of Codes 880 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 4, APRIL 2002 Improved Upper Bounds on Sizes of Codes Beniamin Mounits, Tuvi Etzion, Senior Member, IEEE, and Simon Litsyn, Senior Member, IEEE

More information

A Combinatorial Bound on the List Size

A Combinatorial Bound on the List Size 1 A Combinatorial Bound on the List Size Yuval Cassuto and Jehoshua Bruck California Institute of Technology Electrical Engineering Department MC 136-93 Pasadena, CA 9115, U.S.A. E-mail: {ycassuto,bruck}@paradise.caltech.edu

More information

Which Codes Have 4-Cycle-Free Tanner Graphs?

Which Codes Have 4-Cycle-Free Tanner Graphs? Which Codes Have 4-Cycle-Free Tanner Graphs? Thomas R. Halford Communication Sciences Institute University of Southern California Los Angeles, CA 90089-565 USA Alex J. Grant Institute for Telecommunications

More information

Low complexity two-dimensional weight-constrained codes

Low complexity two-dimensional weight-constrained codes Low complexity two-dimensional weight-constrained codes Erik Ordentlich, Ron M. Roth HP Laboratories HPL-2011-160 Keyword(s): Boolean lattice; resistive memory; two-dimensional coding; weight-constrained

More information

An Extremal Doubly Even Self-Dual Code of Length 112

An Extremal Doubly Even Self-Dual Code of Length 112 An Extremal Doubly Even Self-Dual Code of Length 112 Masaaki Harada Department of Mathematical Sciences Yamagata University Yamagata 990 8560, Japan mharada@sci.kj.yamagata-u.ac.jp Submitted: Dec 29, 2007;

More information

New quasi-symmetric designs constructed using mutually orthogonal Latin squares and Hadamard matrices

New quasi-symmetric designs constructed using mutually orthogonal Latin squares and Hadamard matrices New quasi-symmetric designs constructed using mutually orthogonal Latin squares and Hadamard matrices Carl Bracken, Gary McGuire Department of Mathematics, National University of Ireland, Maynooth, Co.

More information

arxiv:cs/ v1 [cs.it] 15 Sep 2005

arxiv:cs/ v1 [cs.it] 15 Sep 2005 On Hats and other Covers (Extended Summary) arxiv:cs/0509045v1 [cs.it] 15 Sep 2005 Hendrik W. Lenstra Gadiel Seroussi Abstract. We study a game puzzle that has enjoyed recent popularity among mathematicians,

More information

Which Codes Have 4-Cycle-Free Tanner Graphs?

Which Codes Have 4-Cycle-Free Tanner Graphs? Which Codes Have 4-Cycle-Free Tanner Graphs? Thomas R. Halford and Keith M. Chugg Communication Sciences Institute University of Southern California Los Angeles, CA 90089-565, USA Email: {halford, chugg}@usc.edu

More information

Type I Codes over GF(4)

Type I Codes over GF(4) Type I Codes over GF(4) Hyun Kwang Kim San 31, Hyoja Dong Department of Mathematics Pohang University of Science and Technology Pohang, 790-784, Korea e-mail: hkkim@postech.ac.kr Dae Kyu Kim School of

More information

arxiv: v2 [math.co] 17 May 2017

arxiv: v2 [math.co] 17 May 2017 New nonbinary code bounds based on divisibility arguments Sven Polak 1 arxiv:1606.05144v [math.co] 17 May 017 Abstract. For q, n, d N, let A q (n, d) be the maximum size of a code C [q] n with minimum

More information

Extended Binary Linear Codes from Legendre Sequences

Extended Binary Linear Codes from Legendre Sequences Extended Binary Linear Codes from Legendre Sequences T. Aaron Gulliver and Matthew G. Parker Abstract A construction based on Legendre sequences is presented for a doubly-extended binary linear code of

More information

When Data Must Satisfy Constraints Upon Writing

When Data Must Satisfy Constraints Upon Writing When Data Must Satisfy Constraints Upon Writing Erik Ordentlich, Ron M. Roth HP Laboratories HPL-2014-19 Abstract: We initiate a study of constrained codes in which any codeword can be transformed into

More information

4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE

4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE 4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER 2008 List Decoding of Biorthogonal Codes the Hadamard Transform With Linear Complexity Ilya Dumer, Fellow, IEEE, Grigory Kabatiansky,

More information

Hamming codes and simplex codes ( )

Hamming codes and simplex codes ( ) Chapter 6 Hamming codes and simplex codes (2018-03-17) Synopsis. Hamming codes are essentially the first non-trivial family of codes that we shall meet. We start by proving the Distance Theorem for linear

More information

Binary Convolutional Codes of High Rate Øyvind Ytrehus

Binary Convolutional Codes of High Rate Øyvind Ytrehus Binary Convolutional Codes of High Rate Øyvind Ytrehus Abstract The function N(r; ; d free ), defined as the maximum n such that there exists a binary convolutional code of block length n, dimension n

More information

RON M. ROTH * GADIEL SEROUSSI **

RON M. ROTH * GADIEL SEROUSSI ** ENCODING AND DECODING OF BCH CODES USING LIGHT AND SHORT CODEWORDS RON M. ROTH * AND GADIEL SEROUSSI ** ABSTRACT It is shown that every q-ary primitive BCH code of designed distance δ and sufficiently

More information

THE REAL AND THE SYMMETRIC NONNEGATIVE INVERSE EIGENVALUE PROBLEMS ARE DIFFERENT

THE REAL AND THE SYMMETRIC NONNEGATIVE INVERSE EIGENVALUE PROBLEMS ARE DIFFERENT PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 124, Number 12, December 1996, Pages 3647 3651 S 0002-9939(96)03587-3 THE REAL AND THE SYMMETRIC NONNEGATIVE INVERSE EIGENVALUE PROBLEMS ARE DIFFERENT

More information

IN [1] Kiermaier and Zwanzger construct the extended dualized Kerdock codes ˆK

IN [1] Kiermaier and Zwanzger construct the extended dualized Kerdock codes ˆK New upper bounds on binary linear codes and a Z 4 -code with a better-than-linear Gray image Michael Kiermaier, Alfred Wassermann, and Johannes Zwanzger 1 arxiv:1503.03394v2 [cs.it] 16 Mar 2016 Abstract

More information

On Linear Subspace Codes Closed under Intersection

On Linear Subspace Codes Closed under Intersection On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F

More information

Unsolved Problems in Graph Theory Arising from the Study of Codes*

Unsolved Problems in Graph Theory Arising from the Study of Codes* Unsolved Problems in Graph Theory Arising from the Study of Codes* N. J. A. Sloane Mathematical Sciences Research Center AT&T Bell Laboratories Murray Hill, NJ 07974 1. Two fundamental questions in coding

More information

Yinyu Ye, MS&E, Stanford MS&E310 Lecture Note #06. The Simplex Method

Yinyu Ye, MS&E, Stanford MS&E310 Lecture Note #06. The Simplex Method The Simplex Method Yinyu Ye Department of Management Science and Engineering Stanford University Stanford, CA 94305, U.S.A. http://www.stanford.edu/ yyye (LY, Chapters 2.3-2.5, 3.1-3.4) 1 Geometry of Linear

More information

Upper Bounds for Constant-Weight Codes

Upper Bounds for Constant-Weight Codes IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 7, NOVEMBER 2000 2373 Upper Bounds for Constant-Weight Codes Erik Agrell, Member, IEEE, Alexander Vardy, Fellow, IEEE, and Kenneth Zeger, Fellow, IEEE

More information

A Generalized Uncertainty Principle and Sparse Representation in Pairs of Bases

A Generalized Uncertainty Principle and Sparse Representation in Pairs of Bases 2558 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 48, NO 9, SEPTEMBER 2002 A Generalized Uncertainty Principle Sparse Representation in Pairs of Bases Michael Elad Alfred M Bruckstein Abstract An elementary

More information

On non-antipodal binary completely regular codes

On non-antipodal binary completely regular codes On non-antipodal binary completely regular codes J. Borges, J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, 08193-Bellaterra, Spain. V.A. Zinoviev Institute

More information

arxiv: v4 [cs.it] 14 May 2013

arxiv: v4 [cs.it] 14 May 2013 arxiv:1006.1694v4 [cs.it] 14 May 2013 PURE ASYMMETRIC QUANTUM MDS CODES FROM CSS CONSTRUCTION: A COMPLETE CHARACTERIZATION MARTIANUS FREDERIC EZERMAN Centre for Quantum Technologies, National University

More information

On the Griesmer bound for nonlinear codes

On the Griesmer bound for nonlinear codes On the Griesmer bound for nonlinear codes Emanuele Bellini, Alessio Meneghetti To cite this version: Emanuele Bellini, Alessio Meneghetti. On the Griesmer bound for nonlinear codes. Pascale Charpin, Nicolas

More information

On Row-by-Row Coding for 2-D Constraints

On Row-by-Row Coding for 2-D Constraints On Row-by-Row Coding for 2-D Constraints Ido Tal Tuvi Etzion Ron M. Roth Computer Science Department, Technion, Haifa 32000, Israel. Email: {idotal, etzion, ronny}@cs.technion.ac.il Abstract A constant-rate

More information

Construction of a (64, 2 37, 12) Code via Galois Rings

Construction of a (64, 2 37, 12) Code via Galois Rings Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T

More information

Estimates of the Distance Distribution of Codes and Designs

Estimates of the Distance Distribution of Codes and Designs 1050 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 Estimates of the Distance Distribution of Codes Designs Alexei Ashikhmin, Member, IEEE, Alexer Barg, Senior Member, IEEE, Simon

More information

The Witt designs, Golay codes and Mathieu groups

The Witt designs, Golay codes and Mathieu groups The Witt designs, Golay codes and Mathieu groups 1 The Golay codes Let V be a vector space over F q with fixed basis e 1,..., e n. A code C is a subset of V. A linear code is a subspace of V. The vector

More information

Permutation decoding for the binary codes from triangular graphs

Permutation decoding for the binary codes from triangular graphs Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for

More information

Some Nonregular Designs From the Nordstrom and Robinson Code and Their Statistical Properties

Some Nonregular Designs From the Nordstrom and Robinson Code and Their Statistical Properties Some Nonregular Designs From the Nordstrom and Robinson Code and Their Statistical Properties HONGQUAN XU Department of Statistics, University of California, Los Angeles, CA 90095-1554, U.S.A. (hqxu@stat.ucla.edu)

More information

On equidistant constant weight codes

On equidistant constant weight codes Discrete Applied Mathematics 128 (2003) 157 164 www.elsevier.com/locate/dam On equidistant constant weight codes Fang-Wei Fu a;1, Torleiv KlHve b; ;2, Yuan Luo c, Victor K. Wei b a Temasek Laboratories,

More information

Linear programming bounds for. codes of small size. Ilia Krasikov. Tel-Aviv University. School of Mathematical Sciences,

Linear programming bounds for. codes of small size. Ilia Krasikov. Tel-Aviv University. School of Mathematical Sciences, Linear programming bounds for codes of small size Ilia Krasikov Tel-Aviv University School of Mathematical Sciences, Ramat-Aviv 69978 Tel-Aviv, Israel and Beit-Berl College, Kfar-Sava, Israel Simon Litsyn

More information

Constructions of Complementary Sequences for Power-Controlled OFDM Transmission

Constructions of Complementary Sequences for Power-Controlled OFDM Transmission Constructions of Complementary Sequences for Power-Controlled OFDM Transmission Kai-Uwe Schmidt and Adolf Finger Communications Laboratory Technische Universität Dresden 0106 Dresden, Germany schmidtk@ifn.et.tu-dresden.de

More information

Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes

Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Nuh Aydin and Tsvetan Asamov Department of Mathematics Kenyon College Gambier, OH 43022 {aydinn,asamovt}@kenyon.edu

More information

Elementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q),

Elementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q), Elementary 2-Group Character Codes Cunsheng Ding 1, David Kohel 2, and San Ling Abstract In this correspondence we describe a class of codes over GF (q), where q is a power of an odd prime. These codes

More information

Optimal XOR based (2,n)-Visual Cryptography Schemes

Optimal XOR based (2,n)-Visual Cryptography Schemes Optimal XOR based (2,n)-Visual Cryptography Schemes Feng Liu and ChuanKun Wu State Key Laboratory Of Information Security, Institute of Software Chinese Academy of Sciences, Beijing 0090, China Email:

More information

On Locating-Dominating Codes in Binary Hamming Spaces

On Locating-Dominating Codes in Binary Hamming Spaces Discrete Mathematics and Theoretical Computer Science 6, 2004, 265 282 On Locating-Dominating Codes in Binary Hamming Spaces Iiro Honkala and Tero Laihonen and Sanna Ranto Department of Mathematics and

More information

Support weight enumerators and coset weight distributions of isodual codes

Support weight enumerators and coset weight distributions of isodual codes Support weight enumerators and coset weight distributions of isodual codes Olgica Milenkovic Department of Electrical and Computer Engineering University of Colorado, Boulder March 31, 2003 Abstract In

More information

Lecture 3: Error Correcting Codes

Lecture 3: Error Correcting Codes CS 880: Pseudorandomness and Derandomization 1/30/2013 Lecture 3: Error Correcting Codes Instructors: Holger Dell and Dieter van Melkebeek Scribe: Xi Wu In this lecture we review some background on error

More information

The cocycle lattice of binary matroids

The cocycle lattice of binary matroids Published in: Europ. J. Comb. 14 (1993), 241 250. The cocycle lattice of binary matroids László Lovász Eötvös University, Budapest, Hungary, H-1088 Princeton University, Princeton, NJ 08544 Ákos Seress*

More information

On the Correlation Distribution of Delsarte Goethals Sequences

On the Correlation Distribution of Delsarte Goethals Sequences On the Correlation Distribution of Delsarte Goethals Seuences Kai-Uwe Schmidt 9 July 009 (revised 01 December 009) Abstract For odd integer m 3 and t = 0, 1,..., m 1, we define Family V (t) to be a set

More information

Cyclic Linear Binary Locally Repairable Codes

Cyclic Linear Binary Locally Repairable Codes Cyclic Linear Binary Locally Repairable Codes Pengfei Huang, Eitan Yaakobi, Hironori Uchikawa, and Paul H. Siegel Electrical and Computer Engineering Dept., University of California, San Diego, La Jolla,

More information

Information Storage Capacity of Crossbar Switching Networks

Information Storage Capacity of Crossbar Switching Networks Information Storage Capacity of Crossbar Switching etworks ABSTRACT In this work we ask the fundamental uestion: How many bits of information can be stored in a crossbar switching network? The answer is

More information

Chapter 2. Error Correcting Codes. 2.1 Basic Notions

Chapter 2. Error Correcting Codes. 2.1 Basic Notions Chapter 2 Error Correcting Codes The identification number schemes we discussed in the previous chapter give us the ability to determine if an error has been made in recording or transmitting information.

More information

Formally self-dual additive codes over F 4

Formally self-dual additive codes over F 4 Formally self-dual additive codes over F Sunghyu Han School of Liberal Arts, Korea University of Technology and Education, Cheonan 0-708, South Korea Jon-Lark Kim Department of Mathematics, University

More information

PAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES

PAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES International Journal of Pure and Applied Mathematics Volume 85 No. 6 013, 1001-1008 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/10.173/ijpam.v85i6.3

More information

UNIT MEMORY CONVOLUTIONAL CODES WITH MAXIMUM DISTANCE

UNIT MEMORY CONVOLUTIONAL CODES WITH MAXIMUM DISTANCE UNIT MEMORY CONVOLUTIONAL CODES WITH MAXIMUM DISTANCE ROXANA SMARANDACHE Abstract. Unit memory codes and in particular, partial unit memory codes are reviewed. Conditions for the optimality of partial

More information

Secret-sharing with a class of ternary codes

Secret-sharing with a class of ternary codes Theoretical Computer Science 246 (2000) 285 298 www.elsevier.com/locate/tcs Note Secret-sharing with a class of ternary codes Cunsheng Ding a, David R Kohel b, San Ling c; a Department of Computer Science,

More information

Tilings of Binary Spaces

Tilings of Binary Spaces Tilings of Binary Spaces Gérard Cohen Département Informatique ENST, 46 rue Barrault 75634 Paris, France Simon Litsyn Department of Electrical Engineering Tel-Aviv University Ramat-Aviv 69978, Israel Alexander

More information

Lecture 2 Linear Codes

Lecture 2 Linear Codes Lecture 2 Linear Codes 2.1. Linear Codes From now on we want to identify the alphabet Σ with a finite field F q. For general codes, introduced in the last section, the description is hard. For a code of

More information

Low-Power Cooling Codes with Efficient Encoding and Decoding

Low-Power Cooling Codes with Efficient Encoding and Decoding Low-Power Cooling Codes with Efficient Encoding and Decoding Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy, Hengjia Wei School of Physical and Mathematical Sciences, Nanyang Technological

More information

ON SUM OF SQUARES DECOMPOSITION FOR A BIQUADRATIC MATRIX FUNCTION

ON SUM OF SQUARES DECOMPOSITION FOR A BIQUADRATIC MATRIX FUNCTION Annales Univ. Sci. Budapest., Sect. Comp. 33 (2010) 273-284 ON SUM OF SQUARES DECOMPOSITION FOR A BIQUADRATIC MATRIX FUNCTION L. László (Budapest, Hungary) Dedicated to Professor Ferenc Schipp on his 70th

More information

Explicit Ramsey graphs and orthonormal labelings

Explicit Ramsey graphs and orthonormal labelings Explicit Ramsey graphs and orthonormal labelings Noga Alon Submitted: August 22, 1994; Accepted October 29, 1994 Abstract We describe an explicit construction of triangle-free graphs with no independent

More information

Rank and Kernel of binary Hadamard codes.

Rank and Kernel of binary Hadamard codes. 1 Rank and Kernel of binary Hadamard codes. K.T. Phelps, J. Rifà Senior Member IEEE, M. Villanueva Abstract In this paper the rank and the dimension of the kernel for (binary) Hadamard codes of length

More information

Maximum Distance Separable Symbol-Pair Codes

Maximum Distance Separable Symbol-Pair Codes 2012 IEEE International Symposium on Information Theory Proceedings Maximum Distance Separable Symbol-Pair Codes Yeow Meng Chee, Han Mao Kiah, and Chengmin Wang School of Physical and Mathematical Sciences,

More information

Codes and Designs in the Grassmann Scheme

Codes and Designs in the Grassmann Scheme Codes and Designs in the Grassmann Scheme Tuvi Etzion Computer Science Department Technion -Israel Institute of Technology etzion@cs.technion.ac.il ALGEBRAIC COMBINATORICS AND APPLICATIONS ALCOMA10, Thurnau,

More information

Chap6 Duality Theory and Sensitivity Analysis

Chap6 Duality Theory and Sensitivity Analysis Chap6 Duality Theory and Sensitivity Analysis The rationale of duality theory Max 4x 1 + x 2 + 5x 3 + 3x 4 S.T. x 1 x 2 x 3 + 3x 4 1 5x 1 + x 2 + 3x 3 + 8x 4 55 x 1 + 2x 2 + 3x 3 5x 4 3 x 1 ~x 4 0 If we

More information

A Questionable Distance-Regular Graph

A Questionable Distance-Regular Graph A Questionable Distance-Regular Graph Rebecca Ross Abstract In this paper, we introduce distance-regular graphs and develop the intersection algebra for these graphs which is based upon its intersection

More information

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes ELEC 519A Selected Topics in Digital Communications: Information Theory Hamming Codes and Bounds on Codes Single Error Correcting Codes 2 Hamming Codes (7,4,3) Hamming code 1 0 0 0 0 1 1 0 1 0 0 1 0 1

More information

We saw in the last chapter that the linear Hamming codes are nontrivial perfect codes.

We saw in the last chapter that the linear Hamming codes are nontrivial perfect codes. Chapter 5 Golay Codes Lecture 16, March 10, 2011 We saw in the last chapter that the linear Hamming codes are nontrivial perfect codes. Question. Are there any other nontrivial perfect codes? Answer. Yes,

More information

Coding Theory as Pure Mathematics

Coding Theory as Pure Mathematics Coding Theory as Pure Mathematics Steven T. Dougherty July 1, 2013 Origins of Coding Theory How does one communicate electronic information effectively? Namely can one detect and correct errors made in

More information

Binary codes from rectangular lattice graphs and permutation decoding

Binary codes from rectangular lattice graphs and permutation decoding Binary codes from rectangular lattice graphs and permutation decoding J. D. Key a,,1 P. Seneviratne a a Department of Mathematical Sciences, Clemson University, Clemson SC 29634, U.S.A. Abstract We examine

More information

The Hamming Codes and Delsarte s Linear Programming Bound

The Hamming Codes and Delsarte s Linear Programming Bound The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the

More information

FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES

FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES ANDRIES E. BROUWER, ARJEH M. COHEN, MAN V.M. NGUYEN Abstract. All mixed (or asymmetric) orthogonal arrays of strength 3 with run size at most

More information

3.7 Cutting plane methods

3.7 Cutting plane methods 3.7 Cutting plane methods Generic ILP problem min{ c t x : x X = {x Z n + : Ax b} } with m n matrix A and n 1 vector b of rationals. According to Meyer s theorem: There exists an ideal formulation: conv(x

More information

Optimization Methods in Management Science

Optimization Methods in Management Science Optimization Methods in Management Science MIT 15.05 Recitation 8 TAs: Giacomo Nannicini, Ebrahim Nasrabadi At the end of this recitation, students should be able to: 1. Derive Gomory cut from fractional

More information

1. Algebraic and geometric treatments Consider an LP problem in the standard form. x 0. Solutions to the system of linear equations

1. Algebraic and geometric treatments Consider an LP problem in the standard form. x 0. Solutions to the system of linear equations The Simplex Method Most textbooks in mathematical optimization, especially linear programming, deal with the simplex method. In this note we study the simplex method. It requires basically elementary linear

More information

Introduction to Mathematical Programming IE406. Lecture 10. Dr. Ted Ralphs

Introduction to Mathematical Programming IE406. Lecture 10. Dr. Ted Ralphs Introduction to Mathematical Programming IE406 Lecture 10 Dr. Ted Ralphs IE406 Lecture 10 1 Reading for This Lecture Bertsimas 4.1-4.3 IE406 Lecture 10 2 Duality Theory: Motivation Consider the following

More information

Binary construction of quantum codes of minimum distances five and six

Binary construction of quantum codes of minimum distances five and six Discrete Mathematics 308 2008) 1603 1611 www.elsevier.com/locate/disc Binary construction of quantum codes of minimum distances five and six Ruihu Li a, ueliang Li b a Department of Applied Mathematics

More information

A Design and a Code Invariant

A Design and a Code Invariant JOURNAL OF COMBINATORIAL THEORY, Series A 62, 225-233 (1993) A Design and a Code Invariant under the Simple Group Co3 WILLEM H. HAEMERS Department of Economics, Tilburg University, P.O. Box 90153, 5000

More information

ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES

ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES ANDRIES E. BROUWER, ARJEH M. COHEN, MAN V.M. NGUYEN Abstract. All mixed (or asymmetric) orthogonal arrays of strength 3 with run size at most 64 are

More information

The Cosets Code. Aubrey Neumann. Summer 2010

The Cosets Code. Aubrey Neumann. Summer 2010 The Cosets Code Aubrey Neumann Summer 2010 1 Introduction This paper will propose a new binary linear code, determine its fundamental properties and explore the effectiveness single iteration voting decoding.

More information

Sets in Abelian groups with distinct sums of pairs

Sets in Abelian groups with distinct sums of pairs Journal of Number Theory 13 (007) 144 153 www.elsevier.com/locate/jnt Sets in Abelian groups with distinct sums of pairs Harri Haanpää a,,1,patricr.j.östergård b, a Department of Computer Science and Engineering,

More information

Matrix characterization of linear codes with arbitrary Hamming weight hierarchy

Matrix characterization of linear codes with arbitrary Hamming weight hierarchy Linear Algebra and its Applications 412 (2006) 396 407 www.elsevier.com/locate/laa Matrix characterization of linear codes with arbitrary Hamming weight hierarchy G. Viswanath, B. Sundar Rajan Department

More information

Asymmetric binary covering codes

Asymmetric binary covering codes Asymmetric binary covering codes Joshua N Cooper and Robert B Ellis Department of Mathematics, University of California at San Diego, La Jolla, California E-mail: cooper@mathucsdedu, rellis@mathucsdedu

More information

Codes from lattice and related graphs, and permutation decoding

Codes from lattice and related graphs, and permutation decoding Codes from lattice and related graphs, and permutation decoding J. D. Key School of Mathematical Sciences University of KwaZulu-Natal Pietermaritzburg 3209, South Africa B. G. Rodrigues School of Mathematical

More information

Partial permutation decoding for binary linear Hadamard codes

Partial permutation decoding for binary linear Hadamard codes Partial permutation decoding for binary linear Hadamard codes R. D. Barrolleta 1 and M. Villanueva 2 Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona Cerdanyola

More information

Generalized hashing and applications to digital fingerprinting

Generalized hashing and applications to digital fingerprinting Generalized hashing and applications to digital fingerprinting Noga Alon, Gérard Cohen, Michael Krivelevich and Simon Litsyn Abstract Let C be a code of length n over an alphabet of q letters. An n-word

More information

HOMEWORK PROBLEMS FROM STRANG S LINEAR ALGEBRA AND ITS APPLICATIONS (4TH EDITION)

HOMEWORK PROBLEMS FROM STRANG S LINEAR ALGEBRA AND ITS APPLICATIONS (4TH EDITION) HOMEWORK PROBLEMS FROM STRANG S LINEAR ALGEBRA AND ITS APPLICATIONS (4TH EDITION) PROFESSOR STEVEN MILLER: BROWN UNIVERSITY: SPRING 2007 1. CHAPTER 1: MATRICES AND GAUSSIAN ELIMINATION Page 9, # 3: Describe

More information

A Review of Linear Programming

A Review of Linear Programming A Review of Linear Programming Instructor: Farid Alizadeh IEOR 4600y Spring 2001 February 14, 2001 1 Overview In this note we review the basic properties of linear programming including the primal simplex

More information

Chapter 5 Linear Programming (LP)

Chapter 5 Linear Programming (LP) Chapter 5 Linear Programming (LP) General constrained optimization problem: minimize f(x) subject to x R n is called the constraint set or feasible set. any point x is called a feasible point We consider

More information

MATH 324 Summer 2011 Elementary Number Theory. Notes on Mathematical Induction. Recall the following axiom for the set of integers.

MATH 324 Summer 2011 Elementary Number Theory. Notes on Mathematical Induction. Recall the following axiom for the set of integers. MATH 4 Summer 011 Elementary Number Theory Notes on Mathematical Induction Principle of Mathematical Induction Recall the following axiom for the set of integers. Well-Ordering Axiom for the Integers If

More information

Contents. 1 Vectors, Lines and Planes 1. 2 Gaussian Elimination Matrices Vector Spaces and Subspaces 124

Contents. 1 Vectors, Lines and Planes 1. 2 Gaussian Elimination Matrices Vector Spaces and Subspaces 124 Matrices Math 220 Copyright 2016 Pinaki Das This document is freely redistributable under the terms of the GNU Free Documentation License For more information, visit http://wwwgnuorg/copyleft/fdlhtml Contents

More information

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows. EE 387 October 28, 2015 Algebraic Error-Control Codes Homework #4 Solutions Handout #24 1. LBC over GF(5). Let G be a nonsystematic generator matrix for a linear block code over GF(5). 2 4 2 2 4 4 G =

More information

ABSOLUTELY FLAT IDEMPOTENTS

ABSOLUTELY FLAT IDEMPOTENTS ABSOLUTELY FLAT IDEMPOTENTS JONATHAN M GROVES, YONATAN HAREL, CHRISTOPHER J HILLAR, CHARLES R JOHNSON, AND PATRICK X RAULT Abstract A real n-by-n idempotent matrix A with all entries having the same absolute

More information

Determination of the Local Weight Distribution of Binary Linear Block Codes

Determination of the Local Weight Distribution of Binary Linear Block Codes Determination of the Local Weight Distribution of Binary Linear Block Codes Kenji Yasunaga and Toru Fujiwara, Member, IEEE Abstract Some methods to determine the local weight distribution of binary linear

More information

Some codes related to BCH-codes of low dimension

Some codes related to BCH-codes of low dimension Discrete Mathematics 205 (1999) 57 64 www.elsevier.com/locate/disc Some codes related to BCH-codes of low dimension Yves Edel a,jurgen Bierbrauer b; a Mathematisches Institut der Universitat, Im Neuenheimer

More information

Preliminaries and Complexity Theory

Preliminaries and Complexity Theory Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra

More information

Construction ofnew extremal self-dual codes

Construction ofnew extremal self-dual codes Discrete Mathematics 263 (2003) 81 91 www.elsevier.com/locate/disc Construction ofnew extremal self-dual codes T. Aaron Gulliver a;, Masaaki Harada b, Jon-Lark Kim c a Department of Electrical and Computer

More information

Division of Trinomials by Pentanomials and Orthogonal Arrays

Division of Trinomials by Pentanomials and Orthogonal Arrays Division of Trinomials by Pentanomials and Orthogonal Arrays School of Mathematics and Statistics Carleton University daniel@math.carleton.ca Joint work with M. Dewar, L. Moura, B. Stevens and Q. Wang

More information

Two-Dimensional Patterns with Distinct Differences Constructions, Bounds, and Maximal Anticodes

Two-Dimensional Patterns with Distinct Differences Constructions, Bounds, and Maximal Anticodes 1 Two-Dimensional Patterns with Distinct Differences Constructions, Bounds, and Maximal Anticodes Simon R. Blackburn, Tuvi Etzion, Keith M. Martin and Maura B. Paterson Abstract A two-dimensional grid

More information

A strongly polynomial algorithm for linear systems having a binary solution

A strongly polynomial algorithm for linear systems having a binary solution A strongly polynomial algorithm for linear systems having a binary solution Sergei Chubanov Institute of Information Systems at the University of Siegen, Germany e-mail: sergei.chubanov@uni-siegen.de 7th

More information

Chapter 6 Lagrange Codes

Chapter 6 Lagrange Codes Chapter 6 Lagrange Codes 6. Introduction Joseph Louis Lagrange was a famous eighteenth century Italian mathematician [] credited with minimum degree polynomial interpolation amongst his many other achievements.

More information

Lesson 27 Linear Programming; The Simplex Method

Lesson 27 Linear Programming; The Simplex Method Lesson Linear Programming; The Simplex Method Math 0 April 9, 006 Setup A standard linear programming problem is to maximize the quantity c x + c x +... c n x n = c T x subject to constraints a x + a x

More information

Optimal File Sharing in Distributed Networks

Optimal File Sharing in Distributed Networks Optimal File Sharing in Distributed Networks Moni Naor Ron M. Roth Abstract The following file distribution problem is considered: Given a network of processors represented by an undirected graph G = (V,

More information

Intrinsic products and factorizations of matrices

Intrinsic products and factorizations of matrices Available online at www.sciencedirect.com Linear Algebra and its Applications 428 (2008) 5 3 www.elsevier.com/locate/laa Intrinsic products and factorizations of matrices Miroslav Fiedler Academy of Sciences

More information

The Simplex Method: An Example

The Simplex Method: An Example The Simplex Method: An Example Our first step is to introduce one more new variable, which we denote by z. The variable z is define to be equal to 4x 1 +3x 2. Doing this will allow us to have a unified

More information

#A30 INTEGERS 17 (2017) CONFERENCE MATRICES WITH MAXIMUM EXCESS AND TWO-INTERSECTION SETS

#A30 INTEGERS 17 (2017) CONFERENCE MATRICES WITH MAXIMUM EXCESS AND TWO-INTERSECTION SETS #A3 INTEGERS 7 (27) CONFERENCE MATRICES WITH MAIMUM ECESS AND TWO-INTERSECTION SETS Koji Momihara Faculty of Education, Kumamoto University, Kurokami, Kumamoto, Japan momihara@educ.kumamoto-u.ac.jp Sho

More information