Bounds for binary codes with narrow distance distributions
|
|
- Colin Booth
- 5 years ago
- Views:
Transcription
1 Bounds for binary codes with narrow distance distributions Ron M Roth, Gadiel Seroussi Advanced Studies HP Laboratories Palo Alto HPL September 9, 006* constant-weight codes, distance distribution, equidistant codes, linear programming bound New lower bounds are presented on the second moment of the distance distribution of binary codes, in terms of the first moment of the distribution These bounds are used to obtain upper bounds on the size of codes whose maximum distance is close to their minimum distance It is then demonstrated how such bounds can be applied to bound from below the smallest attainable ratio between the maximum distance and the minimum distance of codes Finally, counterparts of the bounds are derived for the special case of constant-weight codes * Internal Accession Date Only Approved for External Publication Copyright 006 Hewlett-Packard Development Company, LP
2 Bounds for binary codes with narrow distance distributions Ron M Roth Gadiel Seroussi September 18, 006 Abstract New lower bounds are presented on the second moment of the distance distribution of binary codes, in terms of the first moment of the distribution These bounds are used to obtain upper bounds on the size of codes whose maximum distance is close to their minimum distance It is then demonstrated how such bounds can be applied to bound from below the smallest attainable ratio between the maximum distance and the minimum distance of codes Finally, counterparts of the bounds are derived for the special case of constant-weight codes Keywords: Constant-weight codes; Distance distribution; Equidistant codes; Grey Rankin bound; Linear programming bound; Quasi-symmetric designs; Selfcomplementary codes 1 Introduction Let C be an n, M, d) binary code of length n, size M > 1, and minimum Hamming distance d) The distance distribution of C is a list B 0 B 1 B n ), where B i is the average over all This work was done in part while both authors were at Hewlett-Packard Laboratories, 1501 Page Mill Road, Palo Alto, CA 930, USA This work was supported in part by grant No from the United- States Israel Binational Science Foundation BSF), Jerusalem, Israel This work was presented in part under a different title) at the IEEE International Symposium on Information Theory ISIT 005), Adelaide, Australia September 005), pp in the proceedings Computer Science Department, Technion, Haifa 3000, Israel ronny@cstechnionacil Mathematical Sciences Research Institute MSRI), 17 Gauss Way, Berkeley CA 970, USA gadiel@msriorg 1
3 codewords c C of the number of codewords at Hamming distance i from c; that is, if d, ) denotes Hamming distance, then B i = 1 {c C : dc, c ) = i}, 0 i n M Equivalently, c C Clearly, B 0 = 1 and B i = 0 when 0 < i < d B i = 1 M {c, c ) C C : dc, c ) = i} Define β i = B i /M for 0 i n Then β i ) n is the probability measure on the distances in C that is induced by assuming a uniform distribution on the codewords of C In particular, E C = iβ i is the average distance between any two codewords in C, and S C = i β i is the second moment of the distances It is known that E C is bounded from above by n/ in fact, this is the basis of the proof of the Plotkin bound: see [9, pp 1 ]) In this work, we obtain a new lower bound on the second moment S C, in terms of the code parameters n and M and the average E C This bound will be presented in Section 3 and a counterpart of that bound for constant-weight codes will be presented in Section 5) There are known bounds on the moments of codes, obtained from MacWilliams identities, the Delsarte linear programming DLP) bound, and enhancements thereof: see [1], [], [3], [9, Sections 5 and 17] We show that there is a range of code parameters for which the bound we present here is not implied by these techniques As an application of our new lower bound, we present in Section an upper bound on the size M of a binary code C, in terms of its length n, minimum distance d, and the maximum distance d max between any two codewords in C The effectiveness of our bound can be seen in cases where d max is close to d, ie, when the distance distribution of the code is required to be narrow As a concrete practical motivation for studying such codes, we refer the reader to [8], where it is demonstrated how binary constant-weight codes with narrow distance distribution can be incorporated into the design of demultiplexers for nano-scale memories The following definition will be useful throughout this work Let A = AC) be an M n real matrix whose rows are indexed by the codewords of C, and the row of A that is indexed by c is given by A) c = c 1 ;
4 here 1 denotes the real all-one vector of length n and the codeword c is regarded as an integer vector over {0, 1} n thus, the entries of A are in { 1, +1}) For i = 0, 1,, n, denote by E i the M M matrix whose rows and columns are indexed by the codewords of C, and for every c, c C, { 1 if dc, c E i ) c,c = ) = i 0 otherwise Let J denote the M M all-one matrix Clearly, we have E 0 = I and n E i = J It follows that AA T = n i) E i = n J i E i 1) Example 11 An n, M, d) binary code C is equidistant if B i 0 only if i {0, d} For equidistant codes we have I if i = 0 E i = J I if i = d 0 otherwise and, so, i=1 AA T = n d) J + d) I ) Bound on the size of equidistant codes In this section, we present an upper bound on the size of equidistant codes At first sight, this result might not seem to be related to the problem of bounding the second moment of the distances However, the proof technique that we use here bears a common ground with the analyses in subsequent sections, through the properties of the matrix AA T in 1) Recall that the Plotkin bound states that for every n, M, d) binary code C for which n < d, M d d n, and equality can be attained only if C is equidistant see [9, pp 1 ]) Proposition 1 Let C be an equidistant n, M, d) binary code Then M n+1, and equality holds if and only if n = d 1 and C attains the Plotkin bound Proof The if part is straightforward: when n = d 1 and C attains the Plotkin bound, then M = d = d = n+1 d n 3
5 Turning to the only if part, the proof is similar to that of Fisher s inequality in block designs see [, p 81] or [9, p 6]) Specifically, we compute the rank of the matrix AA T in two ways On the one hand, rankaa T ) = ranka) n 3) On the other hand, we see from ) that the eigenvalues of AA T multiplicity 1) and d with multiplicity M 1) Therefore, are d + Mn d) with { M 1 if d + Mn d) = 0 rankaa T ) = M otherwise ) We conclude from 3) and ) that M 1 n, with equality holding only if d+mn d) = 0 In case of equality we have n+1 = M = d d n, and it can be readily seen that d/d n) may exceed n only when n = d 1 The bound in Proposition 1 is attained by Hadamard codes [9, Section 3] The n>3, M=n, d=) code that consists of all binary words of length n and Hamming weight 1 is equidistant and its size is the largest possible for its length, given that n > d 1 See Tonchev [11, Section ] and the references therein) for conditions on the existence of equidistant codes that meet the Plotkin bound A characterization of all linear equidistant codes can be found in Bonisoli [5] 3 Bound on the second moment For a real M M matrix Y = y i,j ) M i=1 M j=1, denote by TrY ) its trace and by Y F Frobenius norm, ie, M M 1/ Y F = yi,j) It is easy to verify that i=1 j=1 Y F = TrY ) We make use of the following theorem, which shows the effect on the eigenvalues of a given real symmetric matrix X, caused by subtracting from X a nonnegative definite symmetric matrix of rank 1 see Wilkinson [1, pp 9 97]) Theorem 31 Let X be a real symmetric M M matrix with eigenvalues λ 1 λ λ M and let v be a real row vector of length M Define the matrix Y by Y = X v T v, its
6 and let µ 1 µ µ M be the eigenvalues of Y Then, for r = 1,,, M 1, λ r+1 µ r λ r, and µ M λ M Proposition 3 Let M β i ) n be the distance distribution of an n, M n, d) binary code Then for every nonnegative real γ n/, Proof From 1) we have, i γ) β i γ n AA T = n γ) J + γ i) E i and, so, M i γ) β i = γ i) E i F = AA T n γ) J F 5) In what follows, we bound from below the right-hand side of 5) To this end, we apply Theorem 31 to the symmetric matrix X = AA T and the vector Then, v = n γ ) Y = AA T n γ) J, 6) and the right-hand side of 5) equals Y F = TrY ) Note also that TrY ) = Mγ The matrix X = AA T is nonnegative definite ie, λ M 0), and rankx) = ranka) n; hence, λ n+1 = λ n+ = = λ M = 0 Therefore, by Theorem 31, the eigenvalues of Y satisfy µ n+1 = µ n+ = = µ M 1 = 0 7) and µ M 0 8) 5
7 From 7) 8) it follows that µ r r=1 M µ r = TrY ) = Mγ 0) r=1 Thus, Y F = TrY ) = M µ r r=1 µ r 1 ) M γ µ r n n r=1 where the penultimate inequality follows from the convexity of z z ) The result is now obtained by combining 5), 6), and 9) r=1 9) Theorem 33 Let C be an n, M n, d) binary code Then ne C if E C S C ne C n) if < E C n Proof We observe that i γ) β i = S C γe C + γ, and by Proposition 3 we thus get S C γe C n γ, 10) for every real γ n/ The right-hand side of 10) attains its maximum at ne C if E C γ = n if < E C n, and the result is obtained by substituting this maximizing value of γ into 10) We point out that the inequality S C ne C n) 11) 6
8 obtained by substituting γ = n/ in Proposition 3) is implied by the DLP bound To see this, recall that MacWilliams identities relate the distance distribution B i ) n to its MacWilliams transform B l )n l=0 by B l = 1 M K l i; n) B i, 0 l n, 1) where K l x; n) = l ) ) x n x 1) j, 0 l n j l j j=0 The DLP bound on the code size is then given as the largest attainable value of the sum B 0 + B B n = M), where B i ) n ranges over all nonnegative rational vectors whose MacWilliams transform satisfies the following constraints: B l 0, 0 l n 13) strictly speaking, the rational entries B i should also be such that their sum M is one of their integer common denominators) For l = we have ) n K x; n) = x nx + and, so, thereby yielding 11) 0 B = S C ne C + ) n, From this analysis it follows that when E C )/ eg, when C is a linear code with no all-zero coordinates), Theorem 33 offers no improvement over the DLP bound However, as we see in the sequel, there are instances where Theorem 33 implies a stronger bound than the DLP bound Note that Theorem 33 is at least as strong as Proposition 3, for any γ n/: Proposition 3 is equivalent to the linear constraint 10) on S C and E C for any fixed γ, while Theorem 33 is the intersection or the envelope) of the constraints 10) over all γ n/ The advantage in having the individual linear constraints 10) available is that they can be incorporated into any bounding technique that uses linear programming A qualitative) illustration of the bound of Theorem 33 is shown Figure 1 The curve changes from quadratic to linear in E C at the point E C, S C ) =, n) ): note that it is the quadratic region where the theorem strictly improves on the DLP-implied bound 11) 7
9 S C n, nn+1) ), n) ) Theorem 33 Equation 11) E C E C 1 Figure 1: Bounds on S C in terms of E C E C The figure is, in fact, drawn to scale for the length value n = 5; as such, it exaggerates the proportions of the linear region of the bound For larger n, the proportions change in favor of the quadratic region) For reference, we have also included in the figure the curve E C E C : the inequality S C E C must hold just from the fact that β i) n is a probability measure Bounds for narrow distance distributions Theorem 33 can be used to obtain bounds on the parameters of codes whose distance distributions are limited to a narrow range of distances Specifically, let C be an n, M, d) binary code and denote by d max the maximum distance between any two codewords in C We will be interested in cases where d max is close to d Equidistant codes are an extreme case where d max = d The next proposition yields an upper bound on the code size M, in terms of n, d, and d max 8
10 Proposition 1 Let C be an n, M, d) binary code with maximum distance d max Denote by d a and d g the arithmetic and geometric means, respectively, of d and d max ; ie, Then 1 1 M d a = d max + d 1 1 ) da ) n d g n d a n+1 ) d g and d g = d max d if d a {n+1, n+} if d a {n+1, n+} Proof For d max = d, the result follows from Proposition 1 In addition, the result can be easily verified to hold for the values n =, d = 1, and d max = Therefore, we assume hereafter in the proof that n 3 and d max > d For fixed value of E C, the second moment S C attains its maximum when the distance distribution is concentrated at the boundary distance values, ie, when β i 0 only for i {0, d, d max } In our proof, we apply Theorem 33 to this extreme worst case) distribution Assuming such a distribution, write v = β dmax ; then β d = 1 1/M) v and, so, E C = d 1 1 ) M v + d max v = d 1 1 ) + d max d)v, M or Similarly, d max d)v = E C d 1 1 ) 1) M S C = d 1 1 ) M v + d max v = d 1 1 ) + d max M d )v = d 1 1 ) + d max + d) M = d a E C d g 1 1 ), M E C d 1 1 ) ) M where the third equality follows from 1) We now distinguish between two cases Case 1: E C )/ By Theorem 33 we have ne C d ae C + d g 1 1 ) = ne C M S C 0 15) 9
11 This inequality has a solution for E C only if the discriminant of the quadratic expression in E C ) in 15) is nonnegative, namely, which is the same as or d a d g n 1 1 ) 0, M 1 1 M 1 1 ) da ) 16) n d g Case : E C > )/ We again apply Theorem 33 to obtain ne C n) d a E C + d g 1 1 M 1 d g 1 1 ) = ne C n) S C 0, M d a n)e C + n) ) 17) For d a n/, we bound from above the right-hand side of 17) by replacing E C with )/; this yields 1 1 M 1 d d a ) n) ) 18) g Similarly, for d a > n/, we get the next bound from 17) by substituting E C for n/: 1 1 M 1 d d a n nn+1) ) 19) g A simple check reveals that the right-hand side of 18) is never greater than the righthand side of 16); this means that the bound 16) prevails for d a n/ On the other hand, the right-hand side of 19) exceeds that of 16) whenever n < d a < nn+1) ; 0) observing that n+ < nn+1)/) n+3 for n 3, we conclude from 0) that when d a {n+1, n+}, the upper bound on 1 1/M) is dictated by 19) Remark Since the last proof is based on putting the distribution mass on the extreme distance values, Proposition 1 is useful when d max is bounded away from n; otherwise, our strategy would be too pessimistic For example, it is easy to see that in every n, M, d) binary code, the tail of the distance distribution satisfies B i 1, i>n d/) 10
12 and taking this inequality into account, our bound can then be improved when d max > n d/) We next present two applications of Proposition 1; both take advantage of the fact that the proposition yields the strongest bound when the distance distribution is two-valued ie, the distribution is nonzero only at two nonzero distance values) The first application is an alternate proof of the Grey Rankin bound see [7] and [9, p 5]) Theorem The Grey Rankin bound) Let C be an n, M, d) binary code that is selfcomplementary, ie, if c is a codeword in C then so is the word that is obtained by changing each 1 in c into 0 and each 0 into 1 If n n)/ < d n/ then M 8dn d) n n d) Proof Let C be the n, M/, d ) code obtained by taking one codeword of C from each complementary pair The minimum distance d of C is at least d and its maximum distance d max is at most n d Let d a and d g be given by 1 d max + d ) and d g = d max d, respectively, and define the function z Qz) over the positive reals by Qz) = 1 z + 1 ) z + It is easy to verify that da ) d ) d ) = Q Q = d g d max n d n dn d), where the inequality follows from the fact that Qz) is a decreasing function for z 0, 1] By Proposition 1 we thus have 1 M 1 1 ) da ) 1 1 ) d ) Q = n) n d g n n d dn d), or The result follows ) M n n d) 8dn d) In our next application of Proposition 1, we consider the case where the equidistant property is slightly relaxed As is commonly done in bounds that are based on the distance distribution, we will limit ourselves to even-distant codes, namely, B i 0 only if i is even when d is even, this condition can be guaranteed simply by changing the last coordinate in each codeword of C into a parity bit; when d is odd, we apply the bounds to the n+1, M, d+1) code obtained by adding a parity bit as an n+1)st coordinate) An n, M, d) binary code C is called nearly-equidistant if it is even-distant and d max = d + 11
13 Proposition 3 Let C be a nearly-equidistant n, M, d) binary code Then the following holds i) If n d n/) 1 then M dd+)n d+1) n ii) If n/) 1 < d n+1)/ then n+3))/n 3) if d = )/ M n+ if d = n/ n+1 if d = n+1)/ Proof Part i) corresponds to the case where d a < n+1 in Proposition 1 Part ii) corresponds to the case where either d a {n+1, n+} or the Plotkin bound is attained Example 1 For n = 13 and d =, Proposition 3i) yields the upper bound M 6 This bound is attained by a certain 13, 6, ) binary code whose codewords all have Hamming weight 3 see Brouwer et al [6, Table I-A]); thus, this code is nearly-equidistant In comparison, the DLP bound yields M 0 for these parameters with a feasible solution B = 13 and B 6 = 6) Example The linear n=9, M=, d=) binary code that is generated by the matrix G = can be verified to be nearly-equidistant with minimum distance d = )/ = This code attains the bound in Proposition 3ii), which coincides with the DLP bound in this case Example 3 As shown in [9, p 59], by puncturing the binary simplex code, one can obtain linear nearly-equidistant n= m, M= m, d= m 1 ) binary codes; these codes attain the bound in Proposition 3ii), which again, as expected, coincides with the DLP bound For the code in Example 1 we have d a {n+1, n+}, while the codes in Examples and 3 satisfy d a {n+1, n+} The former therefore belongs to the first range of values of d a in Proposition 1, while the latter belong to the second range therein Each of these 1
14 examples attains the bound in Proposition 1 and violates the bound that corresponds to the range that it does not belong to This shows that the distinction between the two ranges of values of d a in Proposition 1 is necessary Table 1 shows the lower bounds on the length n, which are computed from Proposition 3 and the DLP bound, respectively, for nearly-equidistant n, M, d) binary codes with M = 6 and d =,, 6, 8, 10 the value 6 for M was selected to match the example in [8, Section ]) Note that for d =, the DLP bound yields a better bound than Proposition 3 d Proposition 3 DLP Bound Table 1: Lower bounds on the length n of nearly-equidistant n, M=6, d) binary codes There are coding applications where the parameters of interest are the code length n, size M, and the ratio d max /d rather than the specific values of d and d max ) One such application is the design of demultiplexers for nano-scale memory platforms, where M stands for the memory size and n is the number of address lines, and the goal is to have d max /d as small as possible [8] in this application, the codes are also required to be of the constant-weight type; we consider such codes in Section 5) Propositions 1 and 3 can be used to find a trade-off between the parameters n, M, and d max /d for even-distant codes, as demonstrated in the next example Example We find the largest even-distant binary code with n = 7 and d max /d = /3 From Proposition 3 it follows that every nearly-equidistant n=7, M, d=6) binary code has size M 58 in comparison, the DLP bound provides a feasible solution for M = 309) We next check the values d = 1 and d max = 16 In this case, either bound Proposition 1 or the DLP bound implies the upper bound M 6 There actually exists a linear n=7, M= 6, d=1) code with d max = 16: it is obtained by shortening a selfcomplementary linear 8, 7, 1) code which attains the Grey Rankin bound see Parker et al [10] and Tonchev [11, p 163]) The ratio d max /d = /3 can also be realized by d = 18 and d max =, yet by the Plotkin bound, the largest 7, M, 18) binary code has size M = Using Propositions 1 and 3 and the DLP bound combined), we have created Table : this table provides a lower bound on d max /d as a function of n, where we have taken the size M to be 6 13
15 Range of n d max /d 7 n n 13 1 n 17 5/3 18 n 3/ 3 n 6 7/5 7 n 3 /3 Table : Lower bounds on the ratio d max /d for even-distant n, M=6) binary codes, as a function of n The lower bounds in Table are known to be tight, except possibly for the penultimate row For n = 7 and therefore for every n 7), the ratio d max /d = 3 is attained by the 7, 6, ) parity code for n > 7 we just pad each codeword with a tail of n 7 zeros), and a ratio of d max /d = is attained by the 11, 7, ) code defined in [9, pp 70 71] By shortening the 16, 56, 6) Nordstrom Robinson code, we get a code that attains a ratio of 5/3 for n = 1 see [9, pp 73 7]); similarly, by shortening the extended binary Golay code one can obtain a linear 18, 6, 8) code with a ratio of 3/ Finally, the code described in Example attains a ratio of /3 for n = 7 As of yet, we do not know whether n = 3 is the smallest length for which a ratio of 7/5 is achievable 5 The constant-weight case An n, M, d) binary code C is called a constant-weight code if all the codewords in C have the same Hamming weight We then say that C is an n, M, d, w) code, where w is the Hamming weight of each codeword There is no loss of generality in assuming that w n/, and we will indeed assume this inequality throughout this section Constant-weight codes are always even-distant Proposition 3 can be slightly improved in the case of constant-weight codes, as we show next Proposition 51 Let M β i ) n be the distance distribution of an n, M n, d, w) code, and denote by θ the ratio w/n Then for every nonnegative real γ θ1 θ)n, i γ) β i γ Proof The proof is similar to that of Proposition 3, except that we re-define the M n 1
16 matrix A so that its rows are now given by A) c = c θ 1) the multiplier in this definition is not essential to derive our results: it is inserted only to make the definition here closer to the one in Section 1) It follows that for every codeword c C, A) c 1 T = c 1 T ) }{{} w θ 1 1 T ) = 0 }{{} n This implies that A1 T = 0, which readily means that ranka) Also, for any two codewords c and c, A) c A) T c = c θ 1) c θ 1) T c 1 T ) = c c T ) θ }{{} w dc,c ) } {{ } w = θ1 θ)n dc, c ) + 1 c T ) }{{} w ) θ 1 1 T ) }{{} n Hence, the counterparts of) Equations 1) and 5) become, respectively, and Here M AA T = θ1 θ)n i) E i = θ1 θ)n J i γ) β i = Next, we apply Theorem 31 to X = AA T and F i E i γ i) E i = AA T θ1 θ)n γ) J 1) F v = θ1 θ)n γ ) Y = AA T θ1 θ)n γ) J and, since rankx) = ranka), we get that ie, λ n is also zero); thus, 7) becomes and 8) still holds It follows that λ n = λ n+1 = = λ M = 0 µ n = µ n+1 = = µ M 1 = 0, i=1 µ r r=1 M µ r = TrY ) = Mγ 0) r=1 15
17 and, so, Y F = TrY ) r=1 µ r 1 Finally, we combine the latter equation with 1) r=1 µ r ) M γ Theorem 5 Let C be an n, M n, d, w) code and define α = αn, w) by α = w 1 w ) n Then S C n E C α E C n )α if E C n )α if n )α < E C α Proof Similarly to 10), we get from Proposition 51 that γ = S C γe C n γ, ) for every real γ α The right-hand side of ), in turn, attains its maximum at n E C if E C n )α α if E C > n )α The result is obtained by substituting this value of γ into ) and recalling the known fact that E C α see, eg, [9, pp 55 56], where this fact is used in proving the Johnson bound) We next compare Theorem 5 with the DLP bound for constant-weight codes counterpart of 1) for the constant-weight case is given by where B l = 1 M l The w E l i; n, w) B i, 0 l w, 3) ) ) ) w x n w x E l x; n, w) = j=0 x 1) j j l j l j ) ) w n w, 0 l w, l l 16
18 and the constraints 13) now become B l 0, 0 l w ) see [1, Proposition 16] and [9, p 665]) In particular, for l = we get ) ) n x αn, w) 1) x E x; n, w) = ) ) + 1 w n w and, so, ) ) w n w 0 16 B ) ) ) ) n w n w = S C α 1)E C + 16 ) = ) n )S C nα 1)E C + n α nα Hence, S C 1 ) nα 1)E C n α n + nα 5) A simple check reveals that the bound of Theorem 5 is stronger than 5) whenever E C < nα 1) n nα For larger values of E C, the bound 5) becomes tighter, until the bounds coincide again at E C = α When w = n/, the value of α is n/, in which case the bound 5) coincides with the bound of Theorem 5 whenever E C is in the range nn ) ) = n )α E C α = n ; this range is precisely where the bound of Theorem 5 is linear in E C Example 51 We consider the parameters n = 8 and d max /d = /3 By Theorem 5, the largest nearly-equidistant n=8, M, d=6, w) code has size M 63, and equality is possible only when w = For this value of w, the largest possible size M is attained when E C = α8, ) = 8/7, in which case Theorem 5 coincides with 5); therefore, for w =, Theorem 5 does not offer an improvement over the constant-weight DLP bound However, for larger values of w, Theorem 5 strictly improves on that DLP bound For example, 17
19 for w = 1, Equations 3) ) allow M = 80 as a feasible solution, while Theorem 5 bounds M from above by 58 Similarly, by combining Equations 3) ) with Theorem 5, we get that the largest n=8, M, d=1, w) code with d max = 16 has size M 63, and equality is possible only when w {11, 1} Equality is indeed attained by codes with w = 1 that are based on quasi-symmetric -designs [10], [11, p 163] Table 3 is the constant-weight counterpart of Table for code size M = 6) The first Range of n d max /d n = 8 9 n n 1 15 n 18 5/3 19 n 3 3/ n 8 7/5 9 n 3 /3 Table 3: Lower bounds on the ratio d max /d for n, M=6) constant-weight codes, as a function of n five rows in Table 3 present tight bounds Ratios of and 3, respectively, can be achieved by the trivial) 8, 70,, ) and 9, 8,, 3) codes A ratio of d max /d = is attained by the 11, 66,, 5) code that is based on the Steiner system S, 5, 11) [9, p 70], and a ratio of d max /d = 5/3 is attained by the 15, 70, 6, 6) code that consists of the codewords of Hamming weight 6 in the shortened 15, 18, 6) Nordstrom Robinson code [9, p 7] Finally, one can obtain a 19, 70, 8, 9) code with d max /d = 3/ by shortening, expurgating, and augmenting the set of codewords of Hamming weight 1 in the extended binary Golay code see the Appendix in [8]) Figure depicts the bounds of Theorem 5 and Equation 5), superimposed on Figure 1 Figure is drawn to scale for n = 5 and w = ) References [1] E Agrell, A Vardy, K Zeger, Upper bounds for constant-weight codes, IEEE Trans Inform Theory, 6 000), [] A Ashikhmin, A Barg, Binomial moments of the distance distribution: bounds and applications, IEEE Trans Inform Theory, ),
20 S C α, n α ) n, nn+1) ), n) ) Theorem 33 Equation 11) Theorem 5 E C E C Equation 5) 1 Figure : Bounds for the constant-weight case E C [3] A Ashikhmin, A Barg, S Litsyn, Estimates of the distance distribution of codes and designs, IEEE Trans Inform Theory, 7 001), [] T Beth, D Jungnickel, H Lenz, Design Theory, Cambridge University Press, Cambridge, 1986 [5] A Bonisoli, Every equidistant linear code is a sequence of dual Hamming codes, Ars Combinatoria, ), [6] AE Brouwer, JB Shearer, NJA Sloane, WD Smith, A new table of constant weight codes, IEEE Trans Inform Theory, ), [7] LD Grey, Some bounds for error-correcting codes, IRE Trans Inform Theory, 8 196), 00 0 and 355 [8] PJ Kuekes, W Robinett, RM Roth, G Seroussi, GS Snider, RS Williams, Resistor-logic demultiplexers for nanoelectronics based on constant-weight codes, Nanotechnology, ), [9] FJ MacWilliams, NJA Sloane, The Theory of Error-Correcting Codes, North- Holland, Amsterdam,
21 [10] C Parker, E Spence, VD Tonchev, Designs with the symmetric difference property on 6 points and their groups, J Comb Theory A, ), 3 3 [11] VD Tonchev, Codes and designs, in Handbook of Coding Theory, VS Pless, WC Huffman Editors), Elsevier, Amsterdam, 1998, pp [1] JH Wilkinson, The Algebraic Eigenvalue Problem, Clarendon Press, Oxford,
Improved Upper Bounds on Sizes of Codes
880 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 4, APRIL 2002 Improved Upper Bounds on Sizes of Codes Beniamin Mounits, Tuvi Etzion, Senior Member, IEEE, and Simon Litsyn, Senior Member, IEEE
More informationA Combinatorial Bound on the List Size
1 A Combinatorial Bound on the List Size Yuval Cassuto and Jehoshua Bruck California Institute of Technology Electrical Engineering Department MC 136-93 Pasadena, CA 9115, U.S.A. E-mail: {ycassuto,bruck}@paradise.caltech.edu
More informationWhich Codes Have 4-Cycle-Free Tanner Graphs?
Which Codes Have 4-Cycle-Free Tanner Graphs? Thomas R. Halford Communication Sciences Institute University of Southern California Los Angeles, CA 90089-565 USA Alex J. Grant Institute for Telecommunications
More informationLow complexity two-dimensional weight-constrained codes
Low complexity two-dimensional weight-constrained codes Erik Ordentlich, Ron M. Roth HP Laboratories HPL-2011-160 Keyword(s): Boolean lattice; resistive memory; two-dimensional coding; weight-constrained
More informationAn Extremal Doubly Even Self-Dual Code of Length 112
An Extremal Doubly Even Self-Dual Code of Length 112 Masaaki Harada Department of Mathematical Sciences Yamagata University Yamagata 990 8560, Japan mharada@sci.kj.yamagata-u.ac.jp Submitted: Dec 29, 2007;
More informationNew quasi-symmetric designs constructed using mutually orthogonal Latin squares and Hadamard matrices
New quasi-symmetric designs constructed using mutually orthogonal Latin squares and Hadamard matrices Carl Bracken, Gary McGuire Department of Mathematics, National University of Ireland, Maynooth, Co.
More informationarxiv:cs/ v1 [cs.it] 15 Sep 2005
On Hats and other Covers (Extended Summary) arxiv:cs/0509045v1 [cs.it] 15 Sep 2005 Hendrik W. Lenstra Gadiel Seroussi Abstract. We study a game puzzle that has enjoyed recent popularity among mathematicians,
More informationWhich Codes Have 4-Cycle-Free Tanner Graphs?
Which Codes Have 4-Cycle-Free Tanner Graphs? Thomas R. Halford and Keith M. Chugg Communication Sciences Institute University of Southern California Los Angeles, CA 90089-565, USA Email: {halford, chugg}@usc.edu
More informationType I Codes over GF(4)
Type I Codes over GF(4) Hyun Kwang Kim San 31, Hyoja Dong Department of Mathematics Pohang University of Science and Technology Pohang, 790-784, Korea e-mail: hkkim@postech.ac.kr Dae Kyu Kim School of
More informationarxiv: v2 [math.co] 17 May 2017
New nonbinary code bounds based on divisibility arguments Sven Polak 1 arxiv:1606.05144v [math.co] 17 May 017 Abstract. For q, n, d N, let A q (n, d) be the maximum size of a code C [q] n with minimum
More informationExtended Binary Linear Codes from Legendre Sequences
Extended Binary Linear Codes from Legendre Sequences T. Aaron Gulliver and Matthew G. Parker Abstract A construction based on Legendre sequences is presented for a doubly-extended binary linear code of
More informationWhen Data Must Satisfy Constraints Upon Writing
When Data Must Satisfy Constraints Upon Writing Erik Ordentlich, Ron M. Roth HP Laboratories HPL-2014-19 Abstract: We initiate a study of constrained codes in which any codeword can be transformed into
More information4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE
4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER 2008 List Decoding of Biorthogonal Codes the Hadamard Transform With Linear Complexity Ilya Dumer, Fellow, IEEE, Grigory Kabatiansky,
More informationHamming codes and simplex codes ( )
Chapter 6 Hamming codes and simplex codes (2018-03-17) Synopsis. Hamming codes are essentially the first non-trivial family of codes that we shall meet. We start by proving the Distance Theorem for linear
More informationBinary Convolutional Codes of High Rate Øyvind Ytrehus
Binary Convolutional Codes of High Rate Øyvind Ytrehus Abstract The function N(r; ; d free ), defined as the maximum n such that there exists a binary convolutional code of block length n, dimension n
More informationRON M. ROTH * GADIEL SEROUSSI **
ENCODING AND DECODING OF BCH CODES USING LIGHT AND SHORT CODEWORDS RON M. ROTH * AND GADIEL SEROUSSI ** ABSTRACT It is shown that every q-ary primitive BCH code of designed distance δ and sufficiently
More informationTHE REAL AND THE SYMMETRIC NONNEGATIVE INVERSE EIGENVALUE PROBLEMS ARE DIFFERENT
PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 124, Number 12, December 1996, Pages 3647 3651 S 0002-9939(96)03587-3 THE REAL AND THE SYMMETRIC NONNEGATIVE INVERSE EIGENVALUE PROBLEMS ARE DIFFERENT
More informationIN [1] Kiermaier and Zwanzger construct the extended dualized Kerdock codes ˆK
New upper bounds on binary linear codes and a Z 4 -code with a better-than-linear Gray image Michael Kiermaier, Alfred Wassermann, and Johannes Zwanzger 1 arxiv:1503.03394v2 [cs.it] 16 Mar 2016 Abstract
More informationOn Linear Subspace Codes Closed under Intersection
On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F
More informationUnsolved Problems in Graph Theory Arising from the Study of Codes*
Unsolved Problems in Graph Theory Arising from the Study of Codes* N. J. A. Sloane Mathematical Sciences Research Center AT&T Bell Laboratories Murray Hill, NJ 07974 1. Two fundamental questions in coding
More informationYinyu Ye, MS&E, Stanford MS&E310 Lecture Note #06. The Simplex Method
The Simplex Method Yinyu Ye Department of Management Science and Engineering Stanford University Stanford, CA 94305, U.S.A. http://www.stanford.edu/ yyye (LY, Chapters 2.3-2.5, 3.1-3.4) 1 Geometry of Linear
More informationUpper Bounds for Constant-Weight Codes
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 7, NOVEMBER 2000 2373 Upper Bounds for Constant-Weight Codes Erik Agrell, Member, IEEE, Alexander Vardy, Fellow, IEEE, and Kenneth Zeger, Fellow, IEEE
More informationA Generalized Uncertainty Principle and Sparse Representation in Pairs of Bases
2558 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 48, NO 9, SEPTEMBER 2002 A Generalized Uncertainty Principle Sparse Representation in Pairs of Bases Michael Elad Alfred M Bruckstein Abstract An elementary
More informationOn non-antipodal binary completely regular codes
On non-antipodal binary completely regular codes J. Borges, J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, 08193-Bellaterra, Spain. V.A. Zinoviev Institute
More informationarxiv: v4 [cs.it] 14 May 2013
arxiv:1006.1694v4 [cs.it] 14 May 2013 PURE ASYMMETRIC QUANTUM MDS CODES FROM CSS CONSTRUCTION: A COMPLETE CHARACTERIZATION MARTIANUS FREDERIC EZERMAN Centre for Quantum Technologies, National University
More informationOn the Griesmer bound for nonlinear codes
On the Griesmer bound for nonlinear codes Emanuele Bellini, Alessio Meneghetti To cite this version: Emanuele Bellini, Alessio Meneghetti. On the Griesmer bound for nonlinear codes. Pascale Charpin, Nicolas
More informationOn Row-by-Row Coding for 2-D Constraints
On Row-by-Row Coding for 2-D Constraints Ido Tal Tuvi Etzion Ron M. Roth Computer Science Department, Technion, Haifa 32000, Israel. Email: {idotal, etzion, ronny}@cs.technion.ac.il Abstract A constant-rate
More informationConstruction of a (64, 2 37, 12) Code via Galois Rings
Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T
More informationEstimates of the Distance Distribution of Codes and Designs
1050 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 Estimates of the Distance Distribution of Codes Designs Alexei Ashikhmin, Member, IEEE, Alexer Barg, Senior Member, IEEE, Simon
More informationThe Witt designs, Golay codes and Mathieu groups
The Witt designs, Golay codes and Mathieu groups 1 The Golay codes Let V be a vector space over F q with fixed basis e 1,..., e n. A code C is a subset of V. A linear code is a subspace of V. The vector
More informationPermutation decoding for the binary codes from triangular graphs
Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for
More informationSome Nonregular Designs From the Nordstrom and Robinson Code and Their Statistical Properties
Some Nonregular Designs From the Nordstrom and Robinson Code and Their Statistical Properties HONGQUAN XU Department of Statistics, University of California, Los Angeles, CA 90095-1554, U.S.A. (hqxu@stat.ucla.edu)
More informationOn equidistant constant weight codes
Discrete Applied Mathematics 128 (2003) 157 164 www.elsevier.com/locate/dam On equidistant constant weight codes Fang-Wei Fu a;1, Torleiv KlHve b; ;2, Yuan Luo c, Victor K. Wei b a Temasek Laboratories,
More informationLinear programming bounds for. codes of small size. Ilia Krasikov. Tel-Aviv University. School of Mathematical Sciences,
Linear programming bounds for codes of small size Ilia Krasikov Tel-Aviv University School of Mathematical Sciences, Ramat-Aviv 69978 Tel-Aviv, Israel and Beit-Berl College, Kfar-Sava, Israel Simon Litsyn
More informationConstructions of Complementary Sequences for Power-Controlled OFDM Transmission
Constructions of Complementary Sequences for Power-Controlled OFDM Transmission Kai-Uwe Schmidt and Adolf Finger Communications Laboratory Technische Universität Dresden 0106 Dresden, Germany schmidtk@ifn.et.tu-dresden.de
More informationSome Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes
Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Nuh Aydin and Tsvetan Asamov Department of Mathematics Kenyon College Gambier, OH 43022 {aydinn,asamovt}@kenyon.edu
More informationElementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q),
Elementary 2-Group Character Codes Cunsheng Ding 1, David Kohel 2, and San Ling Abstract In this correspondence we describe a class of codes over GF (q), where q is a power of an odd prime. These codes
More informationOptimal XOR based (2,n)-Visual Cryptography Schemes
Optimal XOR based (2,n)-Visual Cryptography Schemes Feng Liu and ChuanKun Wu State Key Laboratory Of Information Security, Institute of Software Chinese Academy of Sciences, Beijing 0090, China Email:
More informationOn Locating-Dominating Codes in Binary Hamming Spaces
Discrete Mathematics and Theoretical Computer Science 6, 2004, 265 282 On Locating-Dominating Codes in Binary Hamming Spaces Iiro Honkala and Tero Laihonen and Sanna Ranto Department of Mathematics and
More informationSupport weight enumerators and coset weight distributions of isodual codes
Support weight enumerators and coset weight distributions of isodual codes Olgica Milenkovic Department of Electrical and Computer Engineering University of Colorado, Boulder March 31, 2003 Abstract In
More informationLecture 3: Error Correcting Codes
CS 880: Pseudorandomness and Derandomization 1/30/2013 Lecture 3: Error Correcting Codes Instructors: Holger Dell and Dieter van Melkebeek Scribe: Xi Wu In this lecture we review some background on error
More informationThe cocycle lattice of binary matroids
Published in: Europ. J. Comb. 14 (1993), 241 250. The cocycle lattice of binary matroids László Lovász Eötvös University, Budapest, Hungary, H-1088 Princeton University, Princeton, NJ 08544 Ákos Seress*
More informationOn the Correlation Distribution of Delsarte Goethals Sequences
On the Correlation Distribution of Delsarte Goethals Seuences Kai-Uwe Schmidt 9 July 009 (revised 01 December 009) Abstract For odd integer m 3 and t = 0, 1,..., m 1, we define Family V (t) to be a set
More informationCyclic Linear Binary Locally Repairable Codes
Cyclic Linear Binary Locally Repairable Codes Pengfei Huang, Eitan Yaakobi, Hironori Uchikawa, and Paul H. Siegel Electrical and Computer Engineering Dept., University of California, San Diego, La Jolla,
More informationInformation Storage Capacity of Crossbar Switching Networks
Information Storage Capacity of Crossbar Switching etworks ABSTRACT In this work we ask the fundamental uestion: How many bits of information can be stored in a crossbar switching network? The answer is
More informationChapter 2. Error Correcting Codes. 2.1 Basic Notions
Chapter 2 Error Correcting Codes The identification number schemes we discussed in the previous chapter give us the ability to determine if an error has been made in recording or transmitting information.
More informationFormally self-dual additive codes over F 4
Formally self-dual additive codes over F Sunghyu Han School of Liberal Arts, Korea University of Technology and Education, Cheonan 0-708, South Korea Jon-Lark Kim Department of Mathematics, University
More informationPAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES
International Journal of Pure and Applied Mathematics Volume 85 No. 6 013, 1001-1008 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/10.173/ijpam.v85i6.3
More informationUNIT MEMORY CONVOLUTIONAL CODES WITH MAXIMUM DISTANCE
UNIT MEMORY CONVOLUTIONAL CODES WITH MAXIMUM DISTANCE ROXANA SMARANDACHE Abstract. Unit memory codes and in particular, partial unit memory codes are reviewed. Conditions for the optimality of partial
More informationSecret-sharing with a class of ternary codes
Theoretical Computer Science 246 (2000) 285 298 www.elsevier.com/locate/tcs Note Secret-sharing with a class of ternary codes Cunsheng Ding a, David R Kohel b, San Ling c; a Department of Computer Science,
More informationTilings of Binary Spaces
Tilings of Binary Spaces Gérard Cohen Département Informatique ENST, 46 rue Barrault 75634 Paris, France Simon Litsyn Department of Electrical Engineering Tel-Aviv University Ramat-Aviv 69978, Israel Alexander
More informationLecture 2 Linear Codes
Lecture 2 Linear Codes 2.1. Linear Codes From now on we want to identify the alphabet Σ with a finite field F q. For general codes, introduced in the last section, the description is hard. For a code of
More informationLow-Power Cooling Codes with Efficient Encoding and Decoding
Low-Power Cooling Codes with Efficient Encoding and Decoding Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy, Hengjia Wei School of Physical and Mathematical Sciences, Nanyang Technological
More informationON SUM OF SQUARES DECOMPOSITION FOR A BIQUADRATIC MATRIX FUNCTION
Annales Univ. Sci. Budapest., Sect. Comp. 33 (2010) 273-284 ON SUM OF SQUARES DECOMPOSITION FOR A BIQUADRATIC MATRIX FUNCTION L. László (Budapest, Hungary) Dedicated to Professor Ferenc Schipp on his 70th
More informationExplicit Ramsey graphs and orthonormal labelings
Explicit Ramsey graphs and orthonormal labelings Noga Alon Submitted: August 22, 1994; Accepted October 29, 1994 Abstract We describe an explicit construction of triangle-free graphs with no independent
More informationRank and Kernel of binary Hadamard codes.
1 Rank and Kernel of binary Hadamard codes. K.T. Phelps, J. Rifà Senior Member IEEE, M. Villanueva Abstract In this paper the rank and the dimension of the kernel for (binary) Hadamard codes of length
More informationMaximum Distance Separable Symbol-Pair Codes
2012 IEEE International Symposium on Information Theory Proceedings Maximum Distance Separable Symbol-Pair Codes Yeow Meng Chee, Han Mao Kiah, and Chengmin Wang School of Physical and Mathematical Sciences,
More informationCodes and Designs in the Grassmann Scheme
Codes and Designs in the Grassmann Scheme Tuvi Etzion Computer Science Department Technion -Israel Institute of Technology etzion@cs.technion.ac.il ALGEBRAIC COMBINATORICS AND APPLICATIONS ALCOMA10, Thurnau,
More informationChap6 Duality Theory and Sensitivity Analysis
Chap6 Duality Theory and Sensitivity Analysis The rationale of duality theory Max 4x 1 + x 2 + 5x 3 + 3x 4 S.T. x 1 x 2 x 3 + 3x 4 1 5x 1 + x 2 + 3x 3 + 8x 4 55 x 1 + 2x 2 + 3x 3 5x 4 3 x 1 ~x 4 0 If we
More informationA Questionable Distance-Regular Graph
A Questionable Distance-Regular Graph Rebecca Ross Abstract In this paper, we introduce distance-regular graphs and develop the intersection algebra for these graphs which is based upon its intersection
More informationELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes
ELEC 519A Selected Topics in Digital Communications: Information Theory Hamming Codes and Bounds on Codes Single Error Correcting Codes 2 Hamming Codes (7,4,3) Hamming code 1 0 0 0 0 1 1 0 1 0 0 1 0 1
More informationWe saw in the last chapter that the linear Hamming codes are nontrivial perfect codes.
Chapter 5 Golay Codes Lecture 16, March 10, 2011 We saw in the last chapter that the linear Hamming codes are nontrivial perfect codes. Question. Are there any other nontrivial perfect codes? Answer. Yes,
More informationCoding Theory as Pure Mathematics
Coding Theory as Pure Mathematics Steven T. Dougherty July 1, 2013 Origins of Coding Theory How does one communicate electronic information effectively? Namely can one detect and correct errors made in
More informationBinary codes from rectangular lattice graphs and permutation decoding
Binary codes from rectangular lattice graphs and permutation decoding J. D. Key a,,1 P. Seneviratne a a Department of Mathematical Sciences, Clemson University, Clemson SC 29634, U.S.A. Abstract We examine
More informationThe Hamming Codes and Delsarte s Linear Programming Bound
The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the
More informationFRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES
FRACTIONAL FACTORIAL DESIGNS OF STRENGTH 3 AND SMALL RUN SIZES ANDRIES E. BROUWER, ARJEH M. COHEN, MAN V.M. NGUYEN Abstract. All mixed (or asymmetric) orthogonal arrays of strength 3 with run size at most
More information3.7 Cutting plane methods
3.7 Cutting plane methods Generic ILP problem min{ c t x : x X = {x Z n + : Ax b} } with m n matrix A and n 1 vector b of rationals. According to Meyer s theorem: There exists an ideal formulation: conv(x
More informationOptimization Methods in Management Science
Optimization Methods in Management Science MIT 15.05 Recitation 8 TAs: Giacomo Nannicini, Ebrahim Nasrabadi At the end of this recitation, students should be able to: 1. Derive Gomory cut from fractional
More information1. Algebraic and geometric treatments Consider an LP problem in the standard form. x 0. Solutions to the system of linear equations
The Simplex Method Most textbooks in mathematical optimization, especially linear programming, deal with the simplex method. In this note we study the simplex method. It requires basically elementary linear
More informationIntroduction to Mathematical Programming IE406. Lecture 10. Dr. Ted Ralphs
Introduction to Mathematical Programming IE406 Lecture 10 Dr. Ted Ralphs IE406 Lecture 10 1 Reading for This Lecture Bertsimas 4.1-4.3 IE406 Lecture 10 2 Duality Theory: Motivation Consider the following
More informationBinary construction of quantum codes of minimum distances five and six
Discrete Mathematics 308 2008) 1603 1611 www.elsevier.com/locate/disc Binary construction of quantum codes of minimum distances five and six Ruihu Li a, ueliang Li b a Department of Applied Mathematics
More informationA Design and a Code Invariant
JOURNAL OF COMBINATORIAL THEORY, Series A 62, 225-233 (1993) A Design and a Code Invariant under the Simple Group Co3 WILLEM H. HAEMERS Department of Economics, Tilburg University, P.O. Box 90153, 5000
More informationORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES
ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES ANDRIES E. BROUWER, ARJEH M. COHEN, MAN V.M. NGUYEN Abstract. All mixed (or asymmetric) orthogonal arrays of strength 3 with run size at most 64 are
More informationThe Cosets Code. Aubrey Neumann. Summer 2010
The Cosets Code Aubrey Neumann Summer 2010 1 Introduction This paper will propose a new binary linear code, determine its fundamental properties and explore the effectiveness single iteration voting decoding.
More informationSets in Abelian groups with distinct sums of pairs
Journal of Number Theory 13 (007) 144 153 www.elsevier.com/locate/jnt Sets in Abelian groups with distinct sums of pairs Harri Haanpää a,,1,patricr.j.östergård b, a Department of Computer Science and Engineering,
More informationMatrix characterization of linear codes with arbitrary Hamming weight hierarchy
Linear Algebra and its Applications 412 (2006) 396 407 www.elsevier.com/locate/laa Matrix characterization of linear codes with arbitrary Hamming weight hierarchy G. Viswanath, B. Sundar Rajan Department
More informationAsymmetric binary covering codes
Asymmetric binary covering codes Joshua N Cooper and Robert B Ellis Department of Mathematics, University of California at San Diego, La Jolla, California E-mail: cooper@mathucsdedu, rellis@mathucsdedu
More informationCodes from lattice and related graphs, and permutation decoding
Codes from lattice and related graphs, and permutation decoding J. D. Key School of Mathematical Sciences University of KwaZulu-Natal Pietermaritzburg 3209, South Africa B. G. Rodrigues School of Mathematical
More informationPartial permutation decoding for binary linear Hadamard codes
Partial permutation decoding for binary linear Hadamard codes R. D. Barrolleta 1 and M. Villanueva 2 Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona Cerdanyola
More informationGeneralized hashing and applications to digital fingerprinting
Generalized hashing and applications to digital fingerprinting Noga Alon, Gérard Cohen, Michael Krivelevich and Simon Litsyn Abstract Let C be a code of length n over an alphabet of q letters. An n-word
More informationHOMEWORK PROBLEMS FROM STRANG S LINEAR ALGEBRA AND ITS APPLICATIONS (4TH EDITION)
HOMEWORK PROBLEMS FROM STRANG S LINEAR ALGEBRA AND ITS APPLICATIONS (4TH EDITION) PROFESSOR STEVEN MILLER: BROWN UNIVERSITY: SPRING 2007 1. CHAPTER 1: MATRICES AND GAUSSIAN ELIMINATION Page 9, # 3: Describe
More informationA Review of Linear Programming
A Review of Linear Programming Instructor: Farid Alizadeh IEOR 4600y Spring 2001 February 14, 2001 1 Overview In this note we review the basic properties of linear programming including the primal simplex
More informationChapter 5 Linear Programming (LP)
Chapter 5 Linear Programming (LP) General constrained optimization problem: minimize f(x) subject to x R n is called the constraint set or feasible set. any point x is called a feasible point We consider
More informationMATH 324 Summer 2011 Elementary Number Theory. Notes on Mathematical Induction. Recall the following axiom for the set of integers.
MATH 4 Summer 011 Elementary Number Theory Notes on Mathematical Induction Principle of Mathematical Induction Recall the following axiom for the set of integers. Well-Ordering Axiom for the Integers If
More informationContents. 1 Vectors, Lines and Planes 1. 2 Gaussian Elimination Matrices Vector Spaces and Subspaces 124
Matrices Math 220 Copyright 2016 Pinaki Das This document is freely redistributable under the terms of the GNU Free Documentation License For more information, visit http://wwwgnuorg/copyleft/fdlhtml Contents
More informationG Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.
EE 387 October 28, 2015 Algebraic Error-Control Codes Homework #4 Solutions Handout #24 1. LBC over GF(5). Let G be a nonsystematic generator matrix for a linear block code over GF(5). 2 4 2 2 4 4 G =
More informationABSOLUTELY FLAT IDEMPOTENTS
ABSOLUTELY FLAT IDEMPOTENTS JONATHAN M GROVES, YONATAN HAREL, CHRISTOPHER J HILLAR, CHARLES R JOHNSON, AND PATRICK X RAULT Abstract A real n-by-n idempotent matrix A with all entries having the same absolute
More informationDetermination of the Local Weight Distribution of Binary Linear Block Codes
Determination of the Local Weight Distribution of Binary Linear Block Codes Kenji Yasunaga and Toru Fujiwara, Member, IEEE Abstract Some methods to determine the local weight distribution of binary linear
More informationSome codes related to BCH-codes of low dimension
Discrete Mathematics 205 (1999) 57 64 www.elsevier.com/locate/disc Some codes related to BCH-codes of low dimension Yves Edel a,jurgen Bierbrauer b; a Mathematisches Institut der Universitat, Im Neuenheimer
More informationPreliminaries and Complexity Theory
Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra
More informationConstruction ofnew extremal self-dual codes
Discrete Mathematics 263 (2003) 81 91 www.elsevier.com/locate/disc Construction ofnew extremal self-dual codes T. Aaron Gulliver a;, Masaaki Harada b, Jon-Lark Kim c a Department of Electrical and Computer
More informationDivision of Trinomials by Pentanomials and Orthogonal Arrays
Division of Trinomials by Pentanomials and Orthogonal Arrays School of Mathematics and Statistics Carleton University daniel@math.carleton.ca Joint work with M. Dewar, L. Moura, B. Stevens and Q. Wang
More informationTwo-Dimensional Patterns with Distinct Differences Constructions, Bounds, and Maximal Anticodes
1 Two-Dimensional Patterns with Distinct Differences Constructions, Bounds, and Maximal Anticodes Simon R. Blackburn, Tuvi Etzion, Keith M. Martin and Maura B. Paterson Abstract A two-dimensional grid
More informationA strongly polynomial algorithm for linear systems having a binary solution
A strongly polynomial algorithm for linear systems having a binary solution Sergei Chubanov Institute of Information Systems at the University of Siegen, Germany e-mail: sergei.chubanov@uni-siegen.de 7th
More informationChapter 6 Lagrange Codes
Chapter 6 Lagrange Codes 6. Introduction Joseph Louis Lagrange was a famous eighteenth century Italian mathematician [] credited with minimum degree polynomial interpolation amongst his many other achievements.
More informationLesson 27 Linear Programming; The Simplex Method
Lesson Linear Programming; The Simplex Method Math 0 April 9, 006 Setup A standard linear programming problem is to maximize the quantity c x + c x +... c n x n = c T x subject to constraints a x + a x
More informationOptimal File Sharing in Distributed Networks
Optimal File Sharing in Distributed Networks Moni Naor Ron M. Roth Abstract The following file distribution problem is considered: Given a network of processors represented by an undirected graph G = (V,
More informationIntrinsic products and factorizations of matrices
Available online at www.sciencedirect.com Linear Algebra and its Applications 428 (2008) 5 3 www.elsevier.com/locate/laa Intrinsic products and factorizations of matrices Miroslav Fiedler Academy of Sciences
More informationThe Simplex Method: An Example
The Simplex Method: An Example Our first step is to introduce one more new variable, which we denote by z. The variable z is define to be equal to 4x 1 +3x 2. Doing this will allow us to have a unified
More information#A30 INTEGERS 17 (2017) CONFERENCE MATRICES WITH MAXIMUM EXCESS AND TWO-INTERSECTION SETS
#A3 INTEGERS 7 (27) CONFERENCE MATRICES WITH MAIMUM ECESS AND TWO-INTERSECTION SETS Koji Momihara Faculty of Education, Kumamoto University, Kurokami, Kumamoto, Japan momihara@educ.kumamoto-u.ac.jp Sho
More information