Algebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding.
|
|
- Randolf Harper
- 6 years ago
- Views:
Transcription
1 Linear December 2, 2011
2 References Linear Main Source: Stichtenoth, Henning. Function Fields and. Springer, Other Sources: Høholdt, Lint and Pellikaan. geometry codes. Handbook of Coding Theory, vol 1, p , Amsterdam, Bartley and Walker. Geometric over Rings. World Scientific Review, June Guruswami,Venkatesan. Notes 2: Gilbert-Varshamov bound. Jan 2010.
3 Error Correcting Linear
4 Error Correcting Linear Natural way of sending information is a stream of bits:
5 Error Correcting Linear Natural way of sending information is a stream of bits: If one bit is off, the entire message may be 100% different
6 Error Correcting Linear Natural way of sending information is a stream of bits: If one bit is off, the entire message may be 100% different Error Correcting : a way to send information along a noisy channel so that the original message can be recovered with high probability
7 Definitions Definition: A linear code C is a linear subpace of F n q. Linear
8 Definitions Definition: A linear code C is a linear subpace of F n q. Linear Definition: The dimension k of a linear code is its dimension as a vector space
9 Definitions Definition: A linear code C is a linear subpace of F n q. Linear Definition: The dimension k of a linear code is its dimension as a vector space Definition: The Hamming distance between two elements of F n q is the number of coefficients on which the two elements differ. The weight of an element, wt(e), is the number of nonzero coefficients.
10 Definitions Definition: A linear code C is a linear subpace of F n q. Linear Definition: The dimension k of a linear code is its dimension as a vector space Definition: The Hamming distance between two elements of F n q is the number of coefficients on which the two elements differ. The weight of an element, wt(e), is the number of nonzero coefficients. Definition: The minimum distance of a code is the minimum Hamming distance between any two elements of the linear code (equivalently the minimum weight of a codeword)
11 Encoding An encoding is a map from a message into the code C Linear
12 Encoding An encoding is a map from a message into the code C Linear A generator matrix is a k n matrix whose rows are a basis for C
13 Encoding An encoding is a map from a message into the code C Linear A generator matrix is a k n matrix whose rows are a basis for C A generator matrix gives an encoding: ( x1 x 2 ) x 3 a 1 a 2 a 3 a 4 a 5 b 1 b 2 b 3 b 4 b 5 c 1 c 2 c 3 c 4 c 5
14 Error Checking Definition: The dual C of a code C is its dual as a vector space under the canonical inner product. Linear
15 Error Checking Linear Definition: The dual C of a code C is its dual as a vector space under the canonical inner product. Definition: A parity check matrix M for C is an (n k) n matrix whose rows are a basis for C
16 Error Checking Linear Definition: The dual C of a code C is its dual as a vector space under the canonical inner product. Definition: A parity check matrix M for C is an (n k) n matrix whose rows are a basis for C Claim: A vector x := (x 1,..., x n ) F n q is in C if and only if Mx = 0.
17 Error Checking Linear Definition: The dual C of a code C is its dual as a vector space under the canonical inner product. Definition: A parity check matrix M for C is an (n k) n matrix whose rows are a basis for C Claim: A vector x := (x 1,..., x n ) F n q is in C if and only if Mx = 0. Proof. (C ) = C, so
18 Error Checking Linear Definition: The dual C of a code C is its dual as a vector space under the canonical inner product. Definition: A parity check matrix M for C is an (n k) n matrix whose rows are a basis for C Claim: A vector x := (x 1,..., x n ) F n q is in C if and only if Mx = 0. Proof. (C ) = C, so x C x, c = 0 c C
19 Error Checking Linear Definition: The dual C of a code C is its dual as a vector space under the canonical inner product. Definition: A parity check matrix M for C is an (n k) n matrix whose rows are a basis for C Claim: A vector x := (x 1,..., x n ) F n q is in C if and only if Mx = 0. Proof. (C ) = C, so x C x, c = 0 c C Mx = 0
20 Linear Let C be an [n, k, d] code. If x F n q has Hamming distance (d 1)/2 from a codeword c C then c is the unique codeword with minimal distance to x.
21 Linear Let C be an [n, k, d] code. If x F n q has Hamming distance (d 1)/2 from a codeword c C then c is the unique codeword with minimal distance to x. Definition: A decoding is an algorithm, given a F n q and the guarantee that a = c + e for some c C and e F n q with weight (d 1)/2, to recover c.
22 Bounds To maximize code efficacy: Should d be higher or lower with respect to n? Linear
23 Bounds To maximize code efficacy: Should d be higher or lower with respect to n? Should k be higher or lower with respect to n? Linear
24 Bounds Linear To maximize code efficacy: Should d be higher or lower with respect to n? Should k be higher or lower with respect to n? Theorem (Singleton Bound): for all linear codes k + d n + 1
25 Bounds Linear To maximize code efficacy: Should d be higher or lower with respect to n? Should k be higher or lower with respect to n? Theorem (Singleton Bound): for all linear codes k + d n + 1 Proof. Let V := {(a 1,..., a n ) F n q a i = 0 i d}
26 Bounds Linear To maximize code efficacy: Should d be higher or lower with respect to n? Should k be higher or lower with respect to n? Theorem (Singleton Bound): for all linear codes Proof. Let k + d n + 1 V := {(a 1,..., a n ) F n q a i = 0 i d} So dim(v ) = d 1 and V C =, so
27 Bounds Linear To maximize code efficacy: Should d be higher or lower with respect to n? Should k be higher or lower with respect to n? Theorem (Singleton Bound): for all linear codes Proof. Let k + d n + 1 V := {(a 1,..., a n ) F n q a i = 0 i d} So dim(v ) = d 1 and V C =, so n = dim(f n q) dim(v + C) = dim(v ) + dim(c) = (d 1) + k
28 Bounds Linear To maximize code efficacy: Should d be higher or lower with respect to n? Should k be higher or lower with respect to n? Theorem (Singleton Bound): for all linear codes Proof. Let k + d n + 1 V := {(a 1,..., a n ) F n q a i = 0 i d} So dim(v ) = d 1 and V C =, so n = dim(f n q) dim(v + C) = dim(v ) + dim(c) = (d 1) + k
29 Reed-Solomon Linear Let n = q 1 and F q = {0, 1, α,..., α n 1 }. Choose k n, and define L k = {f F q [X ] deg f k 1}
30 Reed-Solomon Linear Let n = q 1 and F q = {0, 1, α,..., α n 1 }. Choose k n, and define Define L k = {f F q [X ] deg f k 1} C RS = {(f (1), f (α),..., f (α n 1 ) f L k }
31 Reed-Solomon Linear Let n = q 1 and F q = {0, 1, α,..., α n 1 }. Choose k n, and define Define L k = {f F q [X ] deg f k 1} C RS = {(f (1), f (α),..., f (α n 1 ) f L k } Claim: C RS is an [n, k, n k + 1] code. Proof. 1 L k C RS is an injective F q -linear map
32 Reed-Solomon Linear Let n = q 1 and F q = {0, 1, α,..., α n 1 }. Choose k n, and define Define L k = {f F q [X ] deg f k 1} C RS = {(f (1), f (α),..., f (α n 1 ) f L k } Claim: C RS is an [n, k, n k + 1] code. Proof. 1 L k C RS is an injective F q -linear map 2 A polynomial of degree k 1 has at most k 1 zeros, so d n k + 1
33 Reed-Solomon Linear Let n = q 1 and F q = {0, 1, α,..., α n 1 }. Choose k n, and define Define L k = {f F q [X ] deg f k 1} C RS = {(f (1), f (α),..., f (α n 1 ) f L k } Claim: C RS is an [n, k, n k + 1] code. Proof. 1 L k C RS is an injective F q -linear map 2 A polynomial of degree k 1 has at most k 1 zeros, so d n k By the Singleton bound, d n k + 1
34 Definition Linear Given: X a curve of genus g over F q with function field F
35 Definition Linear Given: X a curve of genus g over F q with function field F P 1,..., P n distinct places of F of degree one
36 Definition Linear Given: X a curve of genus g over F q with function field F P 1,..., P n distinct places of F of degree one D := P P n a divisor of X
37 Definition Linear Given: X a curve of genus g over F q with function field F P 1,..., P n distinct places of F of degree one D := P P n a divisor of X G a divisor of X such that Supp G Supp D = Define C L (D, G) := {(x(p 1 ),..., x(p n )) x L (G)} F n q
38 Definition Linear Given: X a curve of genus g over F q with function field F P 1,..., P n distinct places of F of degree one D := P P n a divisor of X G a divisor of X such that Supp G Supp D = Define C L (D, G) := {(x(p 1 ),..., x(p n )) x L (G)} F n q Claim: k = l(g) l(g D) and d n deg G.
39 Some Nice Properties Linear If deg G < n then 1 k = l(g) deg(g) + 1 g (Riemann-Roch)
40 Some Nice Properties Linear If deg G < n then 1 k = l(g) deg(g) + 1 g (Riemann-Roch) 2 L (G) C L (D, G) is injective
41 Some Nice Properties Linear If deg G < n then 1 k = l(g) deg(g) + 1 g (Riemann-Roch) 2 L (G) C L (D, G) is injective 3 For a basis {x 1,..., x k } of L (G), the matrix: x 1 (P 1 ) x 1 (P 2 )... x 1 (P n ) x 2 (P 1 ) x 2 (P 2 )... x 2 (P n ) x n (P 1 ) x n (P 2 )... x n (P n ) is a generator matrix for C L.
42 Bounds If deg G < n then k deg(g) + 1 g and d n deg G so Linear
43 Bounds Linear If deg G < n then k deg(g) + 1 g and d n deg G so k + d n + 1 g
44 Bounds If deg G < n then k deg(g) + 1 g and d n deg G so Linear But recall that k + d n + 1 g k + d n + 1
45 Bounds Linear If deg G < n then k deg(g) + 1 g and d n deg G so k + d n + 1 g But recall that k + d n + 1 So for genus 0 curves, k + d = n + 1
46 Bounds Linear If deg G < n then k deg(g) + 1 g and d n deg G so k + d n + 1 g But recall that k + d n + 1 So for genus 0 curves, k + d = n + 1 Unfortunately, for genus zero curves, n q + 1, so over a fixed alphabet, we can t send very large messages.
47 Bounds Linear If deg G < n then k deg(g) + 1 g and d n deg G so k + d n + 1 g But recall that k + d n + 1 So for genus 0 curves, k + d = n + 1 Unfortunately, for genus zero curves, n q + 1, so over a fixed alphabet, we can t send very large messages. Goal of coding theory: To construct asymptotically good curves
48 Asymptotically Good Curves Linear Definition: For an [n, k, d] code: R = k/n is called the information rate, and δ = d/n is called the relative distance
49 Asymptotically Good Curves Linear Definition: For an [n, k, d] code: R = k/n is called the information rate, and δ = d/n is called the relative distance Theorem (Gilbert-Varshamov bound): For any fixed q and δ 1 1/q, and an arbitrarily small ɛ > 0 there exists an infinite family of codes with R 1 h q (δ) ɛ where h q (x) is the entropy function: h q (x) := xlog q (q 1) xlog q (x) (1 x)log q (1 x)
50 Residues of Differentials Let P be a place of F with local parameter t. Linear
51 Residues of Differentials Linear Let P be a place of F with local parameter t. Claim: Any x F can be written uniquely as i=m a it i with a i F q for some integer m.
52 Residues of Differentials Linear Let P be a place of F with local parameter t. Claim: Any x F can be written uniquely as i=m a it i with a i F q for some integer m. Definition: For any differential ω of F, write ω = f dt f = a i t i i=m Define res P (ω) := a 1
53 Residues of Differentials Linear Let P be a place of F with local parameter t. Claim: Any x F can be written uniquely as i=m a it i with a i F q for some integer m. Definition: For any differential ω of F, write ω = f dt f = a i t i i=m Define res P (ω) := a 1 Claim: Residue is well-defined.
54 Another Code Linear Given: P 1,..., P n distinct places of F of degree one D = P P n a divisor of X G a divisor of X such that Supp G Supp D = as before, define C Ω (D, G) := {(res P1 (ω),..., res Pn (ω)) ω Ω F (G D)}
55 Duals Linear Proposition: C Ω (D, G) = C L (D, G)
56 Duals Linear Proposition: C Ω (D, G) = C L (D, G) Proposition: There exists a Weil Differential η which can be explicitly computed such that C Ω (D, G) = C L (D, G) = C Ω (D, D G + (η))
57 Linear Let F := F q 2(x, y) with y q + y = x q+1
58 Linear Let F := F q 2(x, y) with y q + y = x q+1 P α,β be the unique place such that x(p α,β ) = α and y(p α,β ) = β and P be the common pole of x and y.
59 Linear Let F := F q 2(x, y) with y q + y = x q+1 P α,β be the unique place such that x(p α,β ) = α and y(p α,β ) = β and P be the common pole of x and y. D = β q +β=α q+1 P α,β For each 0 < r < q 3 + q 2 q 2 define C r := C L (D, rp )
60 Generating Linear Proposition: For each r 0, the elements of the form x i y j with 0 i 0 j q 1 iq + j(q + 1) r form a basis for L (rp )
61 Generating Linear Proposition: For each r 0, the elements of the form x i y j with 0 i 0 j q 1 iq + j(q + 1) r form a basis for L (rp ) Corollary: The generating matrix for C r is the matrix whose rows are (α i β j ) β q +β=α q+1 where i and j satisfy the above conditions.
62 Bounds Linear Let N(r) be the number of pairs i, j satisfying the properties previously mentioned. Proposition: n = q 3 k = dim C r = d n r { N(r) 0 r < q 3 n N(r) q 3 r q 3 + q 2 q 2
63 Numerical q = 2 Linear Let F 4 = {0, 1, a, a + 1}, C defined by y 2 z + yz 2 + x 3, i.e. F = Frac(F q [x, y, z]/(y 2 z + yz 2 + x 3 ))
64 Numerical q = 2 Linear Let F 4 = {0, 1, a, a + 1}, C defined by y 2 z + yz 2 + x 3, i.e. F = Frac(F q [x, y, z]/(y 2 z + yz 2 + x 3 )) Rational points: [(0 : 0 : 1), (0 : 1 : 0), (0 : 1 : 1), (1 : a : 1), (1 : a + 1 : 1), (a : a : 1), (a : a + 1 : 1), (a + 1 : a : 1), (a + 1 : a + 1 : 1)]
65 Numerical q = 2 Linear Let F 4 = {0, 1, a, a + 1}, C defined by y 2 z + yz 2 + x 3, i.e. F = Frac(F q [x, y, z]/(y 2 z + yz 2 + x 3 )) Rational points: [(0 : 0 : 1), (0 : 1 : 0), (0 : 1 : 1), (1 : a : 1), (1 : a + 1 : 1), (a : a : 1), (a : a + 1 : 1), (a + 1 : a : 1), (a + 1 : a + 1 : 1)] Let r = 5. Then the basis for L (r(0 : 1 : 0)) is {1, x, y, x 2, xy}
66 Numerical generating matrix Linear Generating matrix for C: a a + 1 a a + 1 a a a a a a + 1 a a + 1 a + 1 a 0
67 Numerical generating matrix Linear Generating matrix for C: a a + 1 a a + 1 a a a a a a + 1 a a + 1 a + 1 a 0 Sum of third and fifth rows is ( ) So d = 3.
68 Overview Fix t 0 and let a = c + e with c C Ω and wt(e) t Linear
69 Overview Linear Fix t 0 and let a = c + e with c C Ω and wt(e) t We want an algorithm to compute c given a
70 Overview Linear Fix t 0 and let a = c + e with c C Ω and wt(e) t We want an algorithm to compute c given a Write e = (e 1,..., e n )
71 Overview Linear Fix t 0 and let a = c + e with c C Ω and wt(e) t We want an algorithm to compute c given a Write e = (e 1,..., e n ) Algorithm Steps: 1 Construct f F such that f (P i ) = 0 when e i 0.
72 Overview Linear Fix t 0 and let a = c + e with c C Ω and wt(e) t We want an algorithm to compute c given a Write e = (e 1,..., e n ) Algorithm Steps: 1 Construct f F such that f (P i ) = 0 when e i 0. 2 Compute e i for all i such that f (P i ) = 0.
73 Overview Linear Fix t 0 and let a = c + e with c C Ω and wt(e) t We want an algorithm to compute c given a Write e = (e 1,..., e n ) Algorithm Steps: 1 Construct f F such that f (P i ) = 0 when e i 0. 2 Compute e i for all i such that f (P i ) = 0. 3 Since e i = 0 for all i such that f (P i ) 0, we have computed e. Then c = a e.
74 Algorithm Conditions Linear Let G 1 be a divisor such that Supp G 1 Supp D = deg G 1 < deg G (2g 2) t l(g 1 ) > t
75 Algorithm Conditions Linear Let G 1 be a divisor such that Supp G 1 Supp D = deg G 1 < deg G (2g 2) t l(g 1 ) > t and let n [a, f ] := a i f (P i ) i=1
76 Algorithm Conditions Linear Let G 1 be a divisor such that Supp G 1 Supp D = deg G 1 < deg G (2g 2) t l(g 1 ) > t and let [a, f ] := Fix bases n a i f (P i ) i=1 {f 1,..., f l } of L (G 1 ) {g 1,..., g k } of L (G G 1 ) {h 1,..., h m } of L (G)
77 Algorithm Specifics Linear Proposition: For each 1 ρ k, the linear system l [a, f λ g ρ ] x λ = 0 λ=1 has a nontrivial solution (α 1,..., α l ).
78 Algorithm Specifics Linear Proposition: For each 1 ρ k, the linear system l [a, f λ g ρ ] x λ = 0 λ=1 has a nontrivial solution (α 1,..., α l ). Let l f := α λ f λ λ=1 Then f (P i ) = 0 whenever e i 0
79 Algorithm Specifics Linear Proposition: For each 1 µ m, the linear system h µ (P i ) z i = [a, h µ ] {i f (P i )=0} has a unique solution agreeing with e on all i such that f (P i ) = 0.
80 Algorithm Specifics Linear Proposition: For each 1 µ m, the linear system h µ (P i ) z i = [a, h µ ] {i f (P i )=0} has a unique solution agreeing with e on all i such that f (P i ) = 0. Conclusion: Solving the two linear systems completely computes e and hence we can recover c = a e.
81 Linear Proposition: The dual of C r is C q 3 +q 2 q 2 r
82 Linear Proposition: The dual of C r is C q 3 +q 2 q 2 r Corollary: C L (D, rp ) = C Ω (D, (q 3 + q 2 q 2 r)p )
83 Linear Proposition: The dual of C r is C q 3 +q 2 q 2 r Corollary: C L (D, rp ) = C Ω (D, (q 3 + q 2 q 2 r)p ) We can decode C Ω (D, (q 3 + q 2 q 2 r)p ) with the algorithm given.
Asymptotically good sequences of codes and curves
Asymptotically good sequences of codes and curves Ruud Pellikaan Technical University of Eindhoven Soria Summer School on Computational Mathematics July 9, 2008 /k 1/29 Content: 8 Some algebraic geometry
More informationError-correcting Pairs for a Public-key Cryptosystem
Error-correcting Pairs for a Public-key Cryptosystem Ruud Pellikaan g.r.pellikaan@tue.nl joint work with Irene Márquez-Corbella Code-based Cryptography Workshop 2012 Lyngby, 9 May 2012 Introduction and
More informationAlgebraic geometry codes
Algebraic geometry codes Tom Høholdt, Jacobus H. van Lint and Ruud Pellikaan In the Handbook of Coding Theory, vol 1, pp. 871-961, (V.S. Pless, W.C. Huffman and R.A. Brualdi Eds.), Elsevier, Amsterdam
More informationLecture notes on coding theory
Lecture notes on coding theory Raymond van Bommel Curves over finite fields, Autumn 2017, Leiden 1 Introduction When one agent tries to transfer information to another agent through a noisy channel, errors
More informationOn the floor and the ceiling of a divisor
Finite Fields and Their Applications 12 (2006) 38 55 http://www.elsevier.com/locate/ffa On the floor and the ceiling of a divisor Hiren Maharaj, Gretchen L. Matthews 1 Department of Mathematical Sciences,
More informationLecture 12: November 6, 2017
Information and Coding Theory Autumn 017 Lecturer: Madhur Tulsiani Lecture 1: November 6, 017 Recall: We were looking at codes of the form C : F k p F n p, where p is prime, k is the message length, and
More information6.895 PCP and Hardness of Approximation MIT, Fall Lecture 3: Coding Theory
6895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 3: Coding Theory Lecturer: Dana Moshkovitz Scribe: Michael Forbes and Dana Moshkovitz 1 Motivation In the course we will make heavy use of
More informationBases and applications of Riemann-Roch Spaces of Function Fields with Many Rational Places
Clemson University TigerPrints All Dissertations Dissertations 12-2011 Bases and applications of Riemann-Roch Spaces of Function Fields with Many Rational Places Justin Peachey Clemson University, jpeache@clemson.edu
More informationLinear Block Codes. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay
1 / 26 Linear Block Codes Saravanan Vijayakumaran sarva@ee.iitb.ac.in Department of Electrical Engineering Indian Institute of Technology Bombay July 28, 2014 Binary Block Codes 3 / 26 Let F 2 be the set
More informationLecture 3: Error Correcting Codes
CS 880: Pseudorandomness and Derandomization 1/30/2013 Lecture 3: Error Correcting Codes Instructors: Holger Dell and Dieter van Melkebeek Scribe: Xi Wu In this lecture we review some background on error
More informationAsymptotically good sequences of curves and codes
Asymptotically good sequences of curves and codes Ruud Pellikaan Appeared in in Proc 34th Allerton Conf on Communication, Control, and Computing, Urbana-Champaign, October 2-4, 1996, 276-285 1 Introduction
More informationArrangements, matroids and codes
Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde
More informationTwo-point codes on Norm-Trace curves
Two-point codes on Norm-Trace curves C. Munuera 1, G. C. Tizziotti 2 and F. Torres 2 1 Dept. of Applied Mathematics, University of Valladolid Avda Salamanca SN, 47012 Valladolid, Castilla, Spain 2 IMECC-UNICAMP,
More informationELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes
ELEC 519A Selected Topics in Digital Communications: Information Theory Hamming Codes and Bounds on Codes Single Error Correcting Codes 2 Hamming Codes (7,4,3) Hamming code 1 0 0 0 0 1 1 0 1 0 0 1 0 1
More informationConstructions of digital nets using global function fields
ACTA ARITHMETICA 105.3 (2002) Constructions of digital nets using global function fields by Harald Niederreiter (Singapore) and Ferruh Özbudak (Ankara) 1. Introduction. The theory of (t, m, s)-nets and
More informationConstruction of a Class of Algebraic-Geometric Codes via Gröbner Bases
MM Research Preprints, 42 48 No. 16, April 1998. Beijing Construction of a Class of Algebraic-Geometric Codes via Gröbner Bases Changyan Di, Zhuojun Liu Institute of Systems Science Academia Sinica, Beijing
More informationQuantum Algebraic-Geometric Codes
Quantum Algebraic-Geometric Codes Chiu Fan Lee Clare Hall Cambridge Part III essay in the Department of Applied Mathematics and Theoretical Physics University of Cambridge May 21 Abstract This is a Part
More informationApplications of Algebraic Geometric Codes to Polar Coding
Clemson University TigerPrints All Dissertations Dissertations 5-015 Applications of Algebraic Geometric Codes to Polar Coding Sarah E Anderson Clemson University Follow this and additional works at: https://tigerprintsclemsonedu/all_dissertations
More informationOn the gonality of curves, abundant codes and decoding
On the gonality of curves, abundant codes and decoding Ruud Pellikaan Appeared in: in Coding Theory Algebraic Geometry, Luminy 99, (H. Stichtenoth and M.A. Tsfasman eds.), Lect. Notes Math. 58, Springer,
More informationRUUD PELLIKAAN, HENNING STICHTENOTH, AND FERNANDO TORRES
Appeared in: Finite Fields and their Applications, vol. 4, pp. 38-392, 998. WEIERSTRASS SEMIGROUPS IN AN ASYMPTOTICALLY GOOD TOWER OF FUNCTION FIELDS RUUD PELLIKAAN, HENNING STICHTENOTH, AND FERNANDO TORRES
More informationError Correcting Codes: Combinatorics, Algorithms and Applications Spring Homework Due Monday March 23, 2009 in class
Error Correcting Codes: Combinatorics, Algorithms and Applications Spring 2009 Homework Due Monday March 23, 2009 in class You can collaborate in groups of up to 3. However, the write-ups must be done
More informationSolutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16
Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the
More informationCoding problems for memory and storage applications
.. Coding problems for memory and storage applications Alexander Barg University of Maryland January 27, 2015 A. Barg (UMD) Coding for memory and storage January 27, 2015 1 / 73 Codes with locality Introduction:
More informationLecture 6: Expander Codes
CS369E: Expanders May 2 & 9, 2005 Lecturer: Prahladh Harsha Lecture 6: Expander Codes Scribe: Hovav Shacham In today s lecture, we will discuss the application of expander graphs to error-correcting codes.
More informationError-Correcting Codes
Error-Correcting Codes HMC Algebraic Geometry Final Project Dmitri Skjorshammer December 14, 2010 1 Introduction Transmission of information takes place over noisy signals. This is the case in satellite
More informationLET be the finite field of cardinality and let
128 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 43, NO. 1, JANUARY 1997 An Explicit Construction of a Sequence of Codes Attaining the Tsfasman Vlăduţ Zink Bound The First Steps Conny Voss Tom Høholdt,
More informationError Detection and Correction: Hamming Code; Reed-Muller Code
Error Detection and Correction: Hamming Code; Reed-Muller Code Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Hamming Code: Motivation
More informationAnd for polynomials with coefficients in F 2 = Z/2 Euclidean algorithm for gcd s Concept of equality mod M(x) Extended Euclid for inverses mod M(x)
Outline Recall: For integers Euclidean algorithm for finding gcd s Extended Euclid for finding multiplicative inverses Extended Euclid for computing Sun-Ze Test for primitive roots And for polynomials
More informationLecture Introduction. 2 Linear codes. CS CTT Current Topics in Theoretical CS Oct 4, 2012
CS 59000 CTT Current Topics in Theoretical CS Oct 4, 01 Lecturer: Elena Grigorescu Lecture 14 Scribe: Selvakumaran Vadivelmurugan 1 Introduction We introduced error-correcting codes and linear codes in
More informationLecture 03: Polynomial Based Codes
Lecture 03: Polynomial Based Codes Error-Correcting Codes (Spring 016) Rutgers University Swastik Kopparty Scribes: Ross Berkowitz & Amey Bhangale 1 Reed-Solomon Codes Reed Solomon codes are large alphabet
More informationAlgebraic geometric codes on curves and surfaces
Algebraic geometric codes on curves and surfaces Paolo Zampolini Master Program in Mathematics Faculty of Science University of Padova, Italy. Supervisor: prof. Luca Barbieri Viale Department of Pure and
More information: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane
2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and
More informationLocal correctability of expander codes
Local correctability of expander codes Brett Hemenway Rafail Ostrovsky Mary Wootters IAS April 4, 24 The point(s) of this talk Locally decodable codes are codes which admit sublinear time decoding of small
More informationBounding the number of affine roots
with applications in reliable and secure communication Inaugural Lecture, Aalborg University, August 11110, 11111100000 with applications in reliable and secure communication Polynomials: F (X ) = 2X 2
More informationON WEIERSTRASS SEMIGROUPS AND THE REDUNDANCY OF IMPROVED GEOMETRIC GOPPA CODES
ON WEIERSTRASS SEMIGROUPS AND THE REDUNDANCY OF IMPROVED GEOMETRIC GOPPA CODES RUUD PELLIKAAN AND FERNANDO TORRES Appeared in: IEEE Trans. Inform. Theory, vol. 45, pp. 2512-2519, Nov. 1999 Abstract. Improved
More informationMATH 291T CODING THEORY
California State University, Fresno MATH 291T CODING THEORY Spring 2009 Instructor : Stefaan Delcroix Chapter 1 Introduction to Error-Correcting Codes It happens quite often that a message becomes corrupt
More informationMATH 291T CODING THEORY
California State University, Fresno MATH 291T CODING THEORY Fall 2011 Instructor : Stefaan Delcroix Contents 1 Introduction to Error-Correcting Codes 3 2 Basic Concepts and Properties 6 2.1 Definitions....................................
More informationmult V f, where the sum ranges over prime divisor V X. We say that two divisors D 1 and D 2 are linearly equivalent, denoted by sending
2. The canonical divisor In this section we will introduce one of the most important invariants in the birational classification of varieties. Definition 2.1. Let X be a normal quasi-projective variety
More informationLinear Codes, Target Function Classes, and Network Computing Capacity
Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:
More informationThe Riemann-Roch Theorem
The Riemann-Roch Theorem In this lecture F/K is an algebraic function field of genus g. Definition For A D F, is called the index of specialty of A. i(a) = dim A deg A + g 1 Definition An adele of F/K
More information: Error Correcting Codes. October 2017 Lecture 1
03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of
More informationExercises for algebraic curves
Exercises for algebraic curves Christophe Ritzenthaler February 18, 2019 1 Exercise Lecture 1 1.1 Exercise Show that V = {(x, y) C 2 s.t. y = sin x} is not an algebraic set. Solutions. Let us assume that
More informationMath 512 Syllabus Spring 2017, LIU Post
Week Class Date Material Math 512 Syllabus Spring 2017, LIU Post 1 1/23 ISBN, error-detecting codes HW: Exercises 1.1, 1.3, 1.5, 1.8, 1.14, 1.15 If x, y satisfy ISBN-10 check, then so does x + y. 2 1/30
More informationLecture 12: Reed-Solomon Codes
Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 007) Lecture 1: Reed-Solomon Codes September 8, 007 Lecturer: Atri Rudra Scribe: Michel Kulhandjian Last lecture we saw the proof
More informationA Characterization Of Quantum Codes And Constructions
A Characterization Of Quantum Codes And Constructions Chaoping Xing Department of Mathematics, National University of Singapore Singapore 117543, Republic of Singapore (email: matxcp@nus.edu.sg) Abstract
More informationAn Interpolation Algorithm for List Decoding of Reed-Solomon Codes
An Interpolation Algorithm for List Decoding of Reed-Solomon Codes Kwankyu Lee Department of Mathematics San Diego State University San Diego, USA Email: kwankyu@sogangackr Michael E O Sullivan Department
More informationThe BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes
S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding
More informationError Correcting Codes Questions Pool
Error Correcting Codes Questions Pool Amnon Ta-Shma and Dean Doron January 3, 018 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to
More informationMa/CS 6b Class 25: Error Correcting Codes 2
Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets
More informationLecture 17: Perfect Codes and Gilbert-Varshamov Bound
Lecture 17: Perfect Codes and Gilbert-Varshamov Bound Maximality of Hamming code Lemma Let C be a code with distance 3, then: C 2n n + 1 Codes that meet this bound: Perfect codes Hamming code is a perfect
More informationLinear Algebra. F n = {all vectors of dimension n over field F} Linear algebra is about vectors. Concretely, vectors look like this:
15-251: Great Theoretical Ideas in Computer Science Lecture 23 Linear Algebra Linear algebra is about vectors. Concretely, vectors look like this: They are arrays of numbers. fig. by Peter Dodds # of numbers,
More information15 Dirichlet s unit theorem
18.785 Number theory I Fall 2017 Lecture #15 10/30/2017 15 Dirichlet s unit theorem Let K be a number field. The two main theorems of classical algebraic number theory are: The class group cl O K is finite.
More informationAn Introduction to (Network) Coding Theory
An Introduction to (Network) Coding Theory Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland July 12th, 2018 1 Coding Theory Introduction Reed-Solomon codes 2 Introduction Coherent network
More informationSection 3 Error Correcting Codes (ECC): Fundamentals
Section 3 Error Correcting Codes (ECC): Fundamentals Communication systems and channel models Definition and examples of ECCs Distance For the contents relevant to distance, Lin & Xing s book, Chapter
More informationNotes 10: List Decoding Reed-Solomon Codes and Concatenated codes
Introduction to Coding Theory CMU: Spring 010 Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes April 010 Lecturer: Venkatesan Guruswami Scribe: Venkat Guruswami & Ali Kemal Sinop DRAFT
More informationLecture 8: Shannon s Noise Models
Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecture 8: Shannon s Noise Models September 14, 2007 Lecturer: Atri Rudra Scribe: Sandipan Kundu& Atri Rudra Till now we have
More informationLecture 19 : Reed-Muller, Concatenation Codes & Decoding problem
IITM-CS6845: Theory Toolkit February 08, 2012 Lecture 19 : Reed-Muller, Concatenation Codes & Decoding problem Lecturer: Jayalal Sarma Scribe: Dinesh K Theme: Error correcting codes In the previous lecture,
More informationCode-Based Cryptography Error-Correcting Codes and Cryptography
Code-Based Cryptography Error-Correcting Codes and Cryptography I. Márquez-Corbella 0 1. Error-Correcting Codes and Cryptography 1. Introduction I - Cryptography 2. Introduction II - Coding Theory 3. Encoding
More informationImproved Decoding of Reed Solomon and Algebraic-Geometry Codes. Venkatesan Guruswami and Madhu Sudan /99$ IEEE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 45, NO 6, SEPTEMBER 1999 1757 Improved Decoding of Reed Solomon and Algebraic-Geometry Codes Venkatesan Guruswami and Madhu Sudan Abstract Given an error-correcting
More informationBerlekamp-Massey decoding of RS code
IERG60 Coding for Distributed Storage Systems Lecture - 05//06 Berlekamp-Massey decoding of RS code Lecturer: Kenneth Shum Scribe: Bowen Zhang Berlekamp-Massey algorithm We recall some notations from lecture
More informationc 2010 by Radoslav Mihailov Kirov. All rights reserved.
c 2010 by Radoslav Mihailov Kirov. All rights reserved. IMPROVED BOUNDS FOR CODES AND SECRET SHARING SCHEMES FROM ALGEBRAIC CURVES BY RADOSLAV MIHAILOV KIROV DISSERTATION Submitted in partial fulfillment
More informationThe dual minimum distance of arbitrary-dimensional algebraic-geometric codes
The dual minimum distance of arbitrary-dimensional algebraic-geometric codes Alain Couvreur To cite this version: Alain Couvreur. The dual minimum distance of arbitrary-dimensional algebraic-geometric
More informationLecture 4: Codes based on Concatenation
Lecture 4: Codes based on Concatenation Error-Correcting Codes (Spring 206) Rutgers University Swastik Kopparty Scribe: Aditya Potukuchi and Meng-Tsung Tsai Overview In the last lecture, we studied codes
More informationCyclic codes: overview
Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)
More informationMATH32031: Coding Theory Part 15: Summary
MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,
More informationRefined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth s second tower
Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth s second tower arxiv:5.0630v [cs.it] 9 Nov 05 Olav Geil, Stefano Martin, Umberto Martínez-Peñas, Diego Ruano Abstract Asymptotically
More informationThe Feng Rao bounds. KIAS International Conference on Coding Theory and Applications Olav Geil, Aalborg University, Denmark
Olav Geil Aalborg University Denmark KIAS International Conference on Coding Theory and Applications 2012 Linear code = a subspace. Operations are: Vector addition. Scalar multiplication. [n, k, d] the
More informationMATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9
Problem Set 1 These questions are based on the material in Section 1: Introduction to coding theory. You do not need to submit your answers to any of these questions. 1. The following ISBN was received
More informationLecture 19: Elias-Bassalygo Bound
Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecturer: Atri Rudra Lecture 19: Elias-Bassalygo Bound October 10, 2007 Scribe: Michael Pfetsch & Atri Rudra In the last lecture,
More informationLecture B04 : Linear codes and singleton bound
IITM-CS6845: Theory Toolkit February 1, 2012 Lecture B04 : Linear codes and singleton bound Lecturer: Jayalal Sarma Scribe: T Devanathan We start by proving a generalization of Hamming Bound, which we
More informationIntroduction to Arithmetic Geometry Fall 2013 Problem Set #10 Due: 12/3/2013
18.782 Introduction to Arithmetic Geometry Fall 2013 Problem Set #10 Due: 12/3/2013 These problems are related to the material covered in Lectures 21-22. I have made every effort to proof-read them, but
More informationShannon s Noisy-Channel Coding Theorem
Shannon s Noisy-Channel Coding Theorem Lucas Slot Sebastian Zur February 13, 2015 Lucas Slot, Sebastian Zur Shannon s Noisy-Channel Coding Theorem February 13, 2015 1 / 29 Outline 1 Definitions and Terminology
More informationAsymptotically Good Generalized Algebraic Geometry Codes
Hilko Peter Chang Asymptotically Good Generalized Algebraic Geometry Codes Master thesis, defended on June 11 2010 Thesis advisor: Dr. R.S. de Jong Mathematisch Instituut, Universiteit Leiden Preface
More informationError Detection & Correction
Error Detection & Correction Error detection & correction noisy channels techniques in networking error detection error detection capability retransmition error correction reconstruction checksums redundancy
More informationLecture 7 September 24
EECS 11: Coding for Digital Communication and Beyond Fall 013 Lecture 7 September 4 Lecturer: Anant Sahai Scribe: Ankush Gupta 7.1 Overview This lecture introduces affine and linear codes. Orthogonal signalling
More informationCAYLEY-BACHARACH AND EVALUATION CODES ON COMPLETE INTERSECTIONS
CAYLEY-BACHARACH AND EVALUATION CODES ON COMPLETE INTERSECTIONS LEAH GOLD, JOHN LITTLE, AND HAL SCHENCK Abstract. In [9], J. Hansen uses cohomological methods to find a lower bound for the minimum distance
More informationFrom now on we assume that K = K.
Divisors From now on we assume that K = K. Definition The (additively written) free abelian group generated by P F is denoted by D F and is called the divisor group of F/K. The elements of D F are called
More informationCodes over Subfields. Chapter Basics
Chapter 7 Codes over Subfields In Chapter 6 we looked at various general methods for constructing new codes from old codes. Here we concentrate on two more specialized techniques that result from writing
More informationCoding Theory. Ruud Pellikaan MasterMath 2MMC30. Lecture 11.1 May
Coding Theory Ruud Pellikaan g.r.pellikaan@tue.nl MasterMath 2MMC30 /k Lecture 11.1 May 12-2016 Content lecture 11 2/31 In Lecture 8.2 we introduced the Key equation Now we introduce two algorithms which
More informationList Decoding of Reed Solomon Codes
List Decoding of Reed Solomon Codes p. 1/30 List Decoding of Reed Solomon Codes Madhu Sudan MIT CSAIL Background: Reliable Transmission of Information List Decoding of Reed Solomon Codes p. 2/30 List Decoding
More informationX 1 : X Table 1: Y = X X 2
ECE 534: Elements of Information Theory, Fall 200 Homework 3 Solutions (ALL DUE to Kenneth S. Palacio Baus) December, 200. Problem 5.20. Multiple access (a) Find the capacity region for the multiple-access
More informationSome consequences of the Riemann-Roch theorem
Some consequences of the Riemann-Roch theorem Proposition Let g 0 Z and W 0 D F be such that for all A D F, dim A = deg A + 1 g 0 + dim(w 0 A). Then g 0 = g and W 0 is a canonical divisor. Proof We have
More informationLinear Codes and Syndrome Decoding
Linear Codes and Syndrome Decoding These notes are intended to be used as supplementary reading to Sections 6.7 9 of Grimaldi s Discrete and Combinatorial Mathematics. The proofs of the theorems are left
More informationRIEMANN SURFACES. max(0, deg x f)x.
RIEMANN SURFACES 10. Weeks 11 12: Riemann-Roch theorem and applications 10.1. Divisors. The notion of a divisor looks very simple. Let X be a compact Riemann surface. A divisor is an expression a x x x
More informationNOTES ON FINITE FIELDS
NOTES ON FINITE FIELDS AARON LANDESMAN CONTENTS 1. Introduction to finite fields 2 2. Definition and constructions of fields 3 2.1. The definition of a field 3 2.2. Constructing field extensions by adjoining
More informationarxiv: v1 [math.ag] 13 Mar 2019
THE CONSTRUCTION PROBLEM FOR HODGE NUMBERS MODULO AN INTEGER MATTHIAS PAULSEN AND STEFAN SCHREIEDER arxiv:1903.05430v1 [math.ag] 13 Mar 2019 Abstract. For any integer m 2 and any dimension n 1, we show
More informationIntroduction to Arithmetic Geometry Fall 2013 Lecture #23 11/26/2013
18.782 Introduction to Arithmetic Geometry Fall 2013 Lecture #23 11/26/2013 As usual, a curve is a smooth projective (geometrically irreducible) variety of dimension one and k is a perfect field. 23.1
More informationMathematics Department
Mathematics Department Matthew Pressland Room 7.355 V57 WT 27/8 Advanced Higher Mathematics for INFOTECH Exercise Sheet 2. Let C F 6 3 be the linear code defined by the generator matrix G = 2 2 (a) Find
More informationReed-Solomon codes. Chapter Linear codes over finite fields
Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime
More informationAN EXPOSITION OF THE RIEMANN ROCH THEOREM FOR CURVES
AN EXPOSITION OF THE RIEMANN ROCH THEOREM FOR CURVES DOMINIC L. WYNTER Abstract. We introduce the concepts of divisors on nonsingular irreducible projective algebraic curves, the genus of such a curve,
More informationICT12 8. Linear codes. The Gilbert-Varshamov lower bound and the MacWilliams identities SXD
1 ICT12 8. Linear codes. The Gilbert-Varshamov lower bound and the MacWilliams identities 19.10.2012 SXD 8.1. The Gilbert Varshamov existence condition 8.2. The MacWilliams identities 2 8.1. The Gilbert
More informationMATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q
MATH-315201 This question paper consists of 6 printed pages, each of which is identified by the reference MATH-3152 Only approved basic scientific calculators may be used. c UNIVERSITY OF LEEDS Examination
More informationDecoding Reed-Muller codes over product sets
Rutgers University May 30, 2016 Overview Error-correcting codes 1 Error-correcting codes Motivation 2 Reed-Solomon codes Reed-Muller codes 3 Error-correcting codes Motivation Goal: Send a message Don t
More informationLimits to List Decoding Random Codes
Limits to List Decoding Random Codes Atri Rudra Department of Computer Science and Engineering, University at Buffalo, The State University of New York, Buffalo, NY, 14620. atri@cse.buffalo.edu Abstract
More informationHILBERT FUNCTIONS. 1. Introduction
HILBERT FUCTIOS JORDA SCHETTLER 1. Introduction A Hilbert function (so far as we will discuss) is a map from the nonnegative integers to themselves which records the lengths of composition series of each
More informationThe extended coset leader weight enumerator
The extended coset leader weight enumerator Relinde Jurrius Ruud Pellikaan Eindhoven University of Technology, The Netherlands Symposium on Information Theory in the Benelux, 2009 1/14 Outline Codes, weights
More informationCyclic Redundancy Check Codes
Cyclic Redundancy Check Codes Lectures No. 17 and 18 Dr. Aoife Moloney School of Electronics and Communications Dublin Institute of Technology Overview These lectures will look at the following: Cyclic
More informationAn Introduction to (Network) Coding Theory
An to (Network) Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland April 24th, 2018 Outline 1 Reed-Solomon Codes 2 Network Gabidulin Codes 3 Summary and Outlook A little bit of history
More informationMinimal-span bases, linear system theory, and the invariant factor theorem
Minimal-span bases, linear system theory, and the invariant factor theorem G. David Forney, Jr. MIT Cambridge MA 02139 USA DIMACS Workshop on Algebraic Coding Theory and Information Theory DIMACS Center,
More informationAlgebraic Geometric Codes on Anticanonical Surfaces
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Dissertations, Theses, and Student Research Papers in Mathematics Mathematics, Department of June 2007 Algebraic Geometric
More information