Symmetries of Weight Enumerators
|
|
- Raymond Pope
- 6 years ago
- Views:
Transcription
1 Martino Borello (Paris 8-LAGA) Trento, / 23 Symmetries of Weight Enumerators Martino Borello Université Paris 8 - LAGA Trento,
2 Martino Borello (Paris 8-LAGA) Trento, / 23 Introduction Introduction One of the most remarkable theorems in coding theory is Gleason's 1970 theorem about the weight enumerators of self-dual codes. N. Sloane Properties of codes (or of families of codes) c c ú Symmetries of their weight enumerators M. Borello, O. Mila. On the Stabilizer of Weight Enumerators of Linear Codes. arxiv:
3 Martino Borello (Paris 8-LAGA) Trento, / 23 Background Background q a prime power. Basic definitions A q-ary linear code C of length n is a subspace of F n q. If c pc 1,..., c n q P C (codeword), the (Hamming) weight of c is wtpcq : #ti P t1,..., nu c i 0u (wtpcq : twtpcq c P Cu). If x, y : F n q F n q Ñ F q is the standard inner product, C K : tv P F n q xv, cy 0, for all c P Cu pdual of Cq. If C C K, the code C is called self-dual.
4 Background Martino Borello (Paris 8-LAGA) Trento, / 23 Weight enumerator C F n q ù w C px, yq : cpc with A i : #tc P C wtpcq iu. x n wtpcq y wtpcq ņ i0 A i x n i y i C binary linear code. Divisibility conditions Even: wtpcq 2Z ñ w C px, yq w C px, yq. Doubly-even: wtpcq 4Z ñ w C px, yq w C px, iyq. MacWilliams identities Self-dual ñ w C px, yq w x y C? Remark: self-dual ñ even., x y? 2 2.
5 Background Martino Borello (Paris 8-LAGA) Trento, / 23 Group action GL 2 pcq ý Crx, ys: a A : c b d, ppx, yq ÞÑ ppx, yq A : ppax by, cx dyq. For G GL 2 pcq, denote Crx, ys G : tppx, yq ppx, yq A ppx, P Gu. For ppx, yq P Crx, ys, denote Spppx, yqq : ta P GL 2 pcq ppx, yq A ppx, yqu GL 2 pcq. Example G : B F 1 0 ñ Crx, ys G Crx, y 2 s. 0 1
6 Martino Borello (Paris 8-LAGA) Trento, / 23 Gleason's Theorem Gleason's Theorem Theorem (Gleason '70) Let C be a binary linear code which is self-dual and doubly-even. Then w C px, yq P Crf 1, f 2 s where f 1 : wĥ3 px, yq and f 2 : w G24 px, yq. C self-dual ñ w C px, yq w x y C?, x y? 2 2 C doubly-even ñ w C px, yq w C px, iyq, B F G :?, ñ Crx, ys i G Crf 1, f 2 s.,
7 Gleason's Theorem Martino Borello (Paris 8-LAGA) Trento, / 23 C F n 2 self-dual and doubly-even. Consequences 8 n (Gleason '71). Y n d : min wtpcq 4 cpc t0u 24] If the bound is achieved C is called extremal. A length n is called jump length if 24 n. extremal and doubly-even ñ n (Mallows and Sloane '73). (Zhang '99). Other results loooooooooooooooooooooooooooooooooomoooooooooooooooooooooooooooooooooon jump length and extremal ñ doubly-even (Rains '98) ó all codewords of given weight support a 5-design (Assmus and Mattson '69)
8 Questions Questions Many generalization of Gleason's theorem. G. Nebe, E.M. Rains, N.J.A. Sloane. Self-dual codes and invariant theory. Vol. 17. Berlin: Springer, Idea: properties of families of (self-dual) codes ù symmetries of weight enumerators ù new properties. Our questions Given a weight enumerator of a code, which are its symmetries? Are they shared by the whole family of this code? Which are the possible groups of symmetries? Can we determine with these methods unknown weight enumerators? Martino Borello (Paris 8-LAGA) Trento, / 23
9 Martino Borello (Paris 8-LAGA) Trento, / 23 Possible symmetries Possible symmetries For ppx, yq P Crx, ys h (h=homogeneous), denote V pppx, yqq : tpx : yq P P 1 pcq ppx, yq 0u. This is a set of N degpppx, yqq 1 points. π : Spppx, yqq GL 2 pcq ÞÑ Spppx, yqq PGL 2 pcq. induces a b, px : yq c d PGL 2 pcq ÞÑ Spppx, yqq ý P 1 pcq pax by : cx dyq V pppx, yqq. ý simply 3-transitive
10 Possible symmetries Martino Borello (Paris 8-LAGA) Trento, / 23 ppx, yq P Crx, ys h of degree n. Remark 1 We have Then ppx, yq ppλx, λyq ô λ n 1. NB F ζn 0 Spppx, yqq Spppx, yqq, 0 ζ n where ζ n P C is a primitive n-th root of unity. If Spppx, yqq 8, then Remark 2 #Spppx, yqq n #Spppx, yqq. For all A P GL 2 pcq, we have Spppx, yq A q Spppx, yqq A.
11 Possible symmetries Martino Borello (Paris 8-LAGA) Trento, / 23 Theorem (B.,Mila) #Spppx, yqq 8 ô #V pppx, yqq 3. Proof: ðq V pppx, yqq tp 1, P 2, P 3,..., P m j, ku t1,..., mu there is at most one element A P Spppx, yqq s.t. P A 1 P i, P A 2 P j, P A 3 P k. Then Spppx, yqq m pm 1q pm 2q. ñq If #V pppx, yqq 3, then #Spppx, yqq 8. l In particular, if #V pppx, yqq 3, then #Spppx, yqq n 4.
12 Possible symmetries Martino Borello (Paris 8-LAGA) Trento, / 23 Theorem (Blichfeldt 1917) If H PGL 2 pcq is nite, then H is conjugate to one of the ζ m D Cm for a certain m P , i i D 1 1 A4. 0 ζ m, r 0 1 sd D 1 0 m for a certain m P r i s, i Corollary D 1 1 S4., i i 1 1, 2 ω ω 2 D A5 where ω p1? 5qi p1? 5q. If #V pppx, yqq 3, then DA P GL 2 pcq s.t. Spppx, yq A q is a central extension of one of the groups listed above.
13 Possible symmetries Martino Borello (Paris 8-LAGA) Trento, / 23 C F n q. Proposition ζ m P SpwC px, yqq ô wtpcq mz (divisibility). In particular, if m 5, wtpcq mz ñ Spw C px, yqq C m 1 or Spw C px, yqq D m 1 (m m 1 ). Lemma If q 2, r s P Spw Cpx, yqq ô 1 p1, 1,..., 1q P C. Example (Repetition code) C the r12, 2, 6s binary code with generator matrix r s w C px, yq x 12 2x 6 y 6 y 12 ù Spw C px, yqq D 6.
14 Possible symmetries Martino Borello (Paris 8-LAGA) Trento, / 23 MacWilliams identities. Example (ternary Golay code) C the r12, 6, 6s 3 ternary code with generator matrix w C px, yq x x 6 y 6 440x 3 y 9 24y 12 ù Spw C px, yqq A 4. Example (Hamming code) C the r8, 4, 4s binary code with generator matrix w C px, yq x 8 14x 4 y 4 y 8 ù Spw C px, yqq S 4.
15 Possible symmetries Martino Borello (Paris 8-LAGA) Trento, / 23 Example f 1 px, yq : x x 15 y 5 494x 10 y x 5 y 15 y 20 ; f 2 px, yq : x x 25 y x 20 y x 10 y x 5 y 25 y 30. ppx, yq P Crf 1 px, yq, f 2 px, yqs ñ Spppx, yqq A 5. Open problem Is there a code C such that Spw C px, yqq A 5? Extensive search in Crf 1 px, yq A, f 2 px, yq A s for A P GL 2 pcq of ppx, yq s.t. its coecients are positive; pp1, 0q 1; pp1, 1q is a prime power. Not yet found.
16 Martino Borello (Paris 8-LAGA) Trento, / 23 The algorithm The algorithm Input: ppx, yq P Crx, ys h of degree n s.t. pp1, 0q G : H. 2. V :RootsOfpppx, 1qq tx 1,..., x m u. 3. If m 3, then print(innite group) and break; else V 3 : tall ordered 3-subsets of V u. 4. For tx 1, x 1, x 1 u P V : $ & x 1a b x1x 1 1c x1d 1 0 4a. Solve x 2a b x2x 1 2c x2d 1 0 (the unknowns are a, b, c, d). % x 3a b x3x 1 3c x3d 1 0 Call! a, b, c, d one ) of the 8 1 solutions. (simply 3-transitive) ax b 4b. If cx d x P V V, then a b 4bi. A : c d. 4bii. λ : ppa,cq pp1,0q. B : λ 1{n A. (to x the polynomial, not only the roots) 4biii. If ppx, y q B ppx, y q, then G : G Y tζ nb ζ n P C s.t. ζ n n 1u. Output: G Spppx, yqq.
17 Martino Borello (Paris 8-LAGA) Trento, / 23 The algorithm The algorithm Input: ppx, yq P Crx, ys h of degree n s.t. pp1, 0q G : H. 2. V :RootsOfpppx, 1qq tx 1,..., x m u. (Where?) 3. If m 3, then print(innite group) and break; else V 3 : tall ordered 3-subsets of V u. (#V 3 m 3 3m 2 2m) 4. For tx 1, x 1, x 1 u P V : $ & x 1a b x1x 1 1c x1d 1 0 4a. Solve x 2a b x2x 1 2c x2d 1 0 (the unknowns are a, b, c, d). % x 3a b x3x 1 3c x3d 1 0 Call! a, b, c, d one ) of the 8 1 solutions. (simply 3-transitive) ax b 4b. If cx d x P V V, then a b 4bi. A : c d. 4bii. λ : ppa,cq pp1,0q. B : λ 1{n A. (to x the polynomial, not only the roots) 4biii. If ppx, y q B ppx, y q, then G : G Y tζ nb ζ n P C s.t. ζ n n 1u. Output: G Spppx, yqq.
18 The algorithm Martino Borello (Paris 8-LAGA) Trento, / 23 C F n q linear code. Remark 1 0 P C ñ w C px, yq x n... ñ p1 : 0q R V pw C px, yqq. Remark 2 w C px, yq P Zrx, ys ñ the roots of w C px, 1q are in Z. In the algorithm, roots in K s.t. rk : Qs 8 (splitting eld). Remark 3 If we consider roots in C, we have to deal with approximations.
19 Martino Borello (Paris 8-LAGA) Trento, / 23 Reed-Muller codes Reed-Muller codes RM q pr, mq : tpf paqq apf m q Dimension and minimum distance known. Weight enumerator of a RM q pr, mq code f P F q rx 1,..., x m s of degree ru F qn q. c c ú Counting F q-rational points of hypersurfaces in A m pf q q N. Kaplan. Rational Point Counts for del Pezzo Surfaces over Finite Fields and Coding Theory Thesis (Ph.D.) - Harvard University
20 Reed-Muller codes Martino Borello (Paris 8-LAGA) Trento, / 23 Theorem (Ax '64) Let : qt m 1 r u. Then wtprm q pr, mqq Z. Lemma If r mpq 1q, then RM q pr, mq K RM q pmpq 1q r 1, mq. Remark RM q pr, mq self-dual ô $ & % q power of 2, m is odd, r mpq 1q 1 2. In particular, RM 2 pr, 2r 1q self-dual and doubly-even ñ Spw RM2pr,2r 1qpx, yqq S 4.
21 Reed-Muller codes Martino Borello (Paris 8-LAGA) Trento, / 23 Ax's theorem implies: Theorem (B.,Mila) If one of the following holds q 2 and m 3r 1, q P t3, 4, 5u and m 2r 1, q 5 and m r 1, Then Spw RMqpr,mqpx, yqq is either cyclic or dihedral. Proof ζ P SpwRMqpr,mqpx, yqq of order 5 (ζ primitive -th root of unity). l
22 Reed-Muller codes By the algorithm we get: Theorem (B.,Mila) If m 2, then u u 1 u 1 u P SpwRM2pm 1,mqpx, yqq, with u : ζ 1 2 (ζ primitive 2 m -th root of unity). Theorem (B.,Mila) Let C P trm 4 p2, 2q, RM 4 p3, 2q, RM 5 p2, 2qu, then Spw C px, yqq tidu. Open problem Understand the general behavior and deduce properties and new weight enumerators. Martino Borello (Paris 8-LAGA) Trento, / 23
23 At most two roots At most two roots C F n q s.t. #V pw Cpx, yqq 3. Theorem (B.,Mila) One of the following holds: C t0u; C F n q ; n is even and C is equivalent to n{2 à i1 r1, 1s; n is even, q 2 and w C px, yq px 2 y 2 q n{2. Open problem Is it possible to classify all the binary codes of even length n with weight enumerator px 2 y 2 q n{2? Martino Borello (Paris 8-LAGA) Trento, / 23
24 At most two roots Martino Borello (Paris 8-LAGA) Trento, / 23 M : tbinary codes of length n and weight enumerator px 2 y 2 q n{2 n P 2Nu{, Lemma pm, `q is a semigroup. the r2, 1, 2s code X 1 with generator matrix r1, 1s; the r6, 3, 2s code X 2 with generator matrix ; three r14, 7, 2s codes, X 3, X 4 and X 5, with generator matrices ri X 3 s,ri X 4 s and ri X 5 s respectively, where X 3 : , X 4 : and I is the 7 7 identity matrix Minimal set of generators? Innitely many?, X 5 :
25 At most two roots Martino Borello (Paris 8-LAGA) Trento, / 23 Thank you very much for the attention!
Symmetries of weight enumerators
Martino Borello (Paris 8-LAGA) Gaeta, 06.06.2017 0 / 13 Symmetries of weight enumerators Martino Borello Université Paris 8 - LAGA Fq13 Martino Borello (Paris 8-LAGA) Gaeta, 06.06.2017 1 / 13 Introduction
More informationSelf-Dual Cyclic Codes
Self-Dual Cyclic Codes Bas Heijne November 29, 2007 Definitions Definition Let F be the finite field with two elements and n a positive integer. An [n, k] (block)-code C is a k dimensional linear subspace
More informationOn Extremal Codes With Automorphisms
On Extremal Codes With Automorphisms Anton Malevich Magdeburg, 20 April 2010 joint work with S. Bouyuklieva and W. Willems 1/ 33 1. Linear codes 2. Self-dual and extremal codes 3. Quadratic residue codes
More informationOpen Questions in Coding Theory
Open Questions in Coding Theory Steven T. Dougherty July 4, 2013 Open Questions The following questions were posed by: S.T. Dougherty J.L. Kim P. Solé J. Wood Hilbert Style Problems Hilbert Style Problems
More informationElementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q),
Elementary 2-Group Character Codes Cunsheng Ding 1, David Kohel 2, and San Ling Abstract In this correspondence we describe a class of codes over GF (q), where q is a power of an odd prime. These codes
More informationExtended Binary Linear Codes from Legendre Sequences
Extended Binary Linear Codes from Legendre Sequences T. Aaron Gulliver and Matthew G. Parker Abstract A construction based on Legendre sequences is presented for a doubly-extended binary linear code of
More informationFormally self-dual additive codes over F 4
Formally self-dual additive codes over F Sunghyu Han School of Liberal Arts, Korea University of Technology and Education, Cheonan 0-708, South Korea Jon-Lark Kim Department of Mathematics, University
More informationAutomorphism groups of self-dual binary linear codes
Università degli Studi di Milano - Bicocca Scuola di Dottorato in Scienze Dottorato in Matematica Pura e Applicata - XXVI ciclo Automorphism groups of self-dual binary linear codes with a particular regard
More informationSolutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16
Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the
More informationConstruction X for quantum error-correcting codes
Simon Fraser University Burnaby, BC, Canada joint work with Vijaykumar Singh International Workshop on Coding and Cryptography WCC 2013 Bergen, Norway 15 April 2013 Overview Construction X is known from
More informationOpen problems on cyclic codes
Open problems on cyclic codes Pascale Charpin Contents 1 Introduction 3 2 Different kinds of cyclic codes. 4 2.1 Notation.............................. 5 2.2 Definitions............................. 6
More informationOn the Nonexistence of Perfect 2- and 3-Hamming-Error-Correcting Codes over GF(q)
INFORMATION AND CONTROL 16, 396-401 (1970) On the Nonexistence of Perfect 2- and 3-Hamming-Error-Correcting Codes over GF(q) J. H. VAN LINT Technological University Eindhoven, Netherlands Received December
More informationLocal behaviour of Galois representations
Local behaviour of Galois representations Devika Sharma Weizmann Institute of Science, Israel 23rd June, 2017 Devika Sharma (Weizmann) 23rd June, 2017 1 / 14 The question Let p be a prime. Let f ř 8 ně1
More informationCYCLIC SIEVING FOR CYCLIC CODES
CYCLIC SIEVING FOR CYCLIC CODES ALEX MASON, VICTOR REINER, SHRUTHI SRIDHAR Abstract. These are notes on a preliminary follow-up to a question of Jim Propp, about cyclic sieving of cyclic codes. We show
More information1. Examples. We did most of the following in class in passing. Now compile all that data.
SOLUTIONS Math A4900 Homework 12 11/22/2017 1. Examples. We did most of the following in class in passing. Now compile all that data. (a) Favorite examples: Let R tr, Z, Z{3Z, Z{6Z, M 2 prq, Rrxs, Zrxs,
More informationAn Extremal Doubly Even Self-Dual Code of Length 112
An Extremal Doubly Even Self-Dual Code of Length 112 Masaaki Harada Department of Mathematical Sciences Yamagata University Yamagata 990 8560, Japan mharada@sci.kj.yamagata-u.ac.jp Submitted: Dec 29, 2007;
More informationType I Codes over GF(4)
Type I Codes over GF(4) Hyun Kwang Kim San 31, Hyoja Dong Department of Mathematics Pohang University of Science and Technology Pohang, 790-784, Korea e-mail: hkkim@postech.ac.kr Dae Kyu Kim School of
More informationDecomposing Bent Functions
2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions
More information7.1 Definitions and Generator Polynomials
Chapter 7 Cyclic Codes Lecture 21, March 29, 2011 7.1 Definitions and Generator Polynomials Cyclic codes are an important class of linear codes for which the encoding and decoding can be efficiently implemented
More informationFor example, p12q p2x 1 x 2 ` 5x 2 x 2 3 q 2x 2 x 1 ` 5x 1 x 2 3. (a) Let p 12x 5 1x 7 2x 4 18x 6 2x 3 ` 11x 1 x 2 x 3 x 4,
SOLUTIONS Math A4900 Homework 5 10/4/2017 1. (DF 2.2.12(a)-(d)+) Symmetric polynomials. The group S n acts on the set tx 1, x 2,..., x n u by σ x i x σpiq. That action extends to a function S n ˆ A Ñ A,
More informationRing of the weight enumerators of d + n
Ring of the weight enumerators of Makoto Fujii Manabu Oura Abstract We show that the ring of the weight enumerators of a self-dual doubly even code in arbitrary genus is finitely generated Indeed enough
More informationCover Page. The handle holds various files of this Leiden University dissertation
Cover Page The handle http://hdl.handle.net/1887/37019 holds various files of this Leiden University dissertation Author: Brau Avila, Julio Title: Galois representations of elliptic curves and abelian
More informationMATH32031: Coding Theory Part 15: Summary
MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,
More informationNew binary self-dual codes of lengths 50 to 60
Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) New binary self-dual codes of lengths 50 to 60 Nikolay Yankov Moon Ho Lee Received: date / Accepted: date Abstract Using
More information: Error Correcting Codes. November 2017 Lecture 2
03683072: Error Correcting Codes. November 2017 Lecture 2 Polynomial Codes and Cyclic Codes Amnon Ta-Shma and Dean Doron 1 Polynomial Codes Fix a finite field F q. For the purpose of constructing polynomial
More informationAlgebraic Characterization of Minimum Weight Codewords of Cyclic Codes
Algebraic Characterization of Minimum Weight Codewords of Cyclic Codes Daniel Augot Abstract We consider primitive cyclic codes of length n over GF (q), where n = q m 1, and for any such code with defining
More informationSOME DESIGNS AND CODES FROM L 2 (q) Communicated by Alireza Abdollahi
Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 3 No. 1 (2014), pp. 15-28. c 2014 University of Isfahan www.combinatorics.ir www.ui.ac.ir SOME DESIGNS AND CODES FROM
More informationFinite geometry codes, generalized Hadamard matrices, and Hamada and Assmus conjectures p. 1/2
Finite geometry codes, generalized Hadamard matrices, and Hamada and Assmus conjectures Vladimir D. Tonchev a Department of Mathematical Sciences Michigan Technological University Houghton, Michigan 49931,
More informationCYCLIC SEPARABLE GOPPA CODES
bsv@aanet.ru sna@delfa.net Saint Petersburg State University of Aerospace Instrumentation Russia Algebraic and Combinatorial Coding Theory June 15-21, 2012 Pomorie, Bulgaria Outline Overview of previous
More informationThe Hamming Codes and Delsarte s Linear Programming Bound
The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the
More informationALGEBRA QUALIFYING EXAM SPRING 2012
ALGEBRA QUALIFYING EXAM SPRING 2012 Work all of the problems. Justify the statements in your solutions by reference to specific results, as appropriate. Partial credit is awarded for partial solutions.
More informationA Projection Decoding of a Binary Extremal Self-Dual Code of Length 40
A Projection Decoding of a Binary Extremal Self-Dual Code of Length 4 arxiv:7.48v [cs.it] 6 Jan 27 Jon-Lark Kim Department of Mathematics Sogang University Seoul, 2-742, South Korea jlkim@sogang.ac.kr
More informationOrthogonal Arrays & Codes
Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible
More information2 (17) Find non-trivial left and right ideals of the ring of 22 matrices over R. Show that there are no nontrivial two sided ideals. (18) State and pr
MATHEMATICS Introduction to Modern Algebra II Review. (1) Give an example of a non-commutative ring; a ring without unit; a division ring which is not a eld and a ring which is not a domain. (2) Show that
More informationGroup Theory. 1. Show that Φ maps a conjugacy class of G into a conjugacy class of G.
Group Theory Jan 2012 #6 Prove that if G is a nonabelian group, then G/Z(G) is not cyclic. Aug 2011 #9 (Jan 2010 #5) Prove that any group of order p 2 is an abelian group. Jan 2012 #7 G is nonabelian nite
More informationSubcodes of the Projective Generalized Reed-Muller Codes Spanned by Minimum-Weight Vectors
Subcodes of the Projective Generalized Reed-Muller Codes Spanned by Minimum-Weight Vectors Peng Ding Fair Isaac and Company, Inc. 200 Smith Ranch Road San Rafael CA 94903-1996 Jennifer D. Key Department
More informationarxiv: v2 [math.co] 11 Oct 2016
ON SUBSEQUENCES OF QUIDDITY CYCLES AND NICHOLS ALGEBRAS arxiv:1610.043v [math.co] 11 Oct 016 M. CUNTZ Abstract. We provide a tool to obtain local descriptions of quiddity cycles. As an application, we
More information: Error Correcting Codes. October 2017 Lecture 1
03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of
More informationConstruction of quasi-cyclic self-dual codes
Construction of quasi-cyclic self-dual codes Sunghyu Han, Jon-Lark Kim, Heisook Lee, and Yoonjin Lee December 17, 2011 Abstract There is a one-to-one correspondence between l-quasi-cyclic codes over a
More informationNOTES WEEK 02 DAY 1. THEOREM 0.3. Let A, B and C be sets. Then
NOTES WEEK 02 DAY 1 SCOT ADAMS LEMMA 0.1. @propositions P, Q, R, rp or pq&rqs rp p or Qq&pP or Rqs. THEOREM 0.2. Let A and B be sets. Then (i) A X B B X A, and (ii) A Y B B Y A THEOREM 0.3. Let A, B and
More informationAPPROXIMATE HOMOMORPHISMS BETWEEN THE BOOLEAN CUBE AND GROUPS OF PRIME ORDER
APPROXIMATE HOMOMORPHISMS BETWEEN THE BOOLEAN CUBE AND GROUPS OF PRIME ORDER TOM SANDERS The purpose of this note is to highlight a question raised by Shachar Lovett [Lov], and to offer some motivation
More informationTheorem The simple finite dimensional sl 2 modules Lpdq are indexed by
The Lie algebra sl 2 pcq has basis x, y, and h, with relations rh, xs 2x, rh, ys 2y, and rx, ys h. Theorem The simple finite dimensional sl 2 modules Lpdq are indexed by d P Z ě0 with basis tv`, yv`, y
More informationCodes and Rings: Theory and Practice
Codes and Rings: Theory and Practice Patrick Solé CNRS/LAGA Paris, France, January 2017 Geometry of codes : the music of spheres R = a finite ring with identity. A linear code of length n over a ring R
More informationABSTRACT INVESTIGATION INTO SOLVABLE QUINTICS. Professor Lawrence C. Washington Department of Mathematics
ABSTRACT Title of thesis: INVESTIGATION INTO SOLVABLE QUINTICS Maria-Victoria Checa, Master of Science, 2004 Thesis directed by: Professor Lawrence C. Washington Department of Mathematics Solving quintics
More informationLecture 20 FUNDAMENTAL Theorem of Finitely Generated Abelian Groups (FTFGAG)
Lecture 20 FUNDAMENTAL Theorem of Finitely Generated Abelian Groups (FTFGAG) Warm up: 1. Let n 1500. Find all sequences n 1 n 2... n s 2 satisfying n i 1 and n 1 n s n (where s can vary from sequence to
More informationOn Divisible Codes over Finite Fields
On Divisible Codes over Finite Fields Thesis by Xiaoyu Liu In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy California Institute of Technology Pasadena, California 2006
More informationCombinatória e Teoria de Códigos Exercises from the notes. Chapter 1
Combinatória e Teoria de Códigos Exercises from the notes Chapter 1 1.1. The following binary word 01111000000?001110000?00110011001010111000000000?01110 encodes a date. The encoding method used consisted
More informationCodes over Subfields. Chapter Basics
Chapter 7 Codes over Subfields In Chapter 6 we looked at various general methods for constructing new codes from old codes. Here we concentrate on two more specialized techniques that result from writing
More informationThe primitive root theorem
The primitive root theorem Mar Steinberger First recall that if R is a ring, then a R is a unit if there exists b R with ab = ba = 1. The collection of all units in R is denoted R and forms a group under
More information5.0 BCH and Reed-Solomon Codes 5.1 Introduction
5.0 BCH and Reed-Solomon Codes 5.1 Introduction A. Hocquenghem (1959), Codes correcteur d erreurs; Bose and Ray-Chaudhuri (1960), Error Correcting Binary Group Codes; First general family of algebraic
More informationPartial Permutation Decoding for abelian codes
1 Partial Permutation Decoding for abelian codes José Joaquín Bernal Juan Jacobo Simón Abstract In [3], we introduced a technique to construct an information set for every semisimple abelian code over
More informationInformation Theory. Lecture 7
Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible
More informationGeometry. Relations in SO(3) Supported by Geodetic Angles. J. H. Conway, 1 C. Radin, 2 and L. Sadun Introduction and Results
Discrete Comput Geom 23:453 463 (2000) DOI: 10.1007/s004540010015 Discrete & Computational Geometry 2000 Springer-Verlag New York Inc. Relations in SO(3) Supported by Geodetic Angles J. H. Conway, 1 C.
More informationBinary construction of quantum codes of minimum distances five and six
Discrete Mathematics 308 2008) 1603 1611 www.elsevier.com/locate/disc Binary construction of quantum codes of minimum distances five and six Ruihu Li a, ueliang Li b a Department of Applied Mathematics
More informationConstruction of a (64, 2 37, 12) Code via Galois Rings
Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T
More informationVector spaces. EE 387, Notes 8, Handout #12
Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is
More informationON THE INTEGRAL RING SPANNED BY GENUS TWO WEIGHT ENUMERATORS. Manabu Oura
ON THE INTEGRAL RING SPANNED BY GENUS TWO WEIGHT ENUMERATORS Manabu Oura Abstract. It is known that the weight enumerator of a self-ual oublyeven coe in genus g = 1 can be uniquely written as an isobaric
More informationGroups and Representations
Groups and Representations Madeleine Whybrow Imperial College London These notes are based on the course Groups and Representations taught by Prof. A.A. Ivanov at Imperial College London during the Autumn
More informationSupport weight enumerators and coset weight distributions of isodual codes
Support weight enumerators and coset weight distributions of isodual codes Olgica Milenkovic Department of Electrical and Computer Engineering University of Colorado, Boulder March 31, 2003 Abstract In
More informationRevista Integración ISSN: X Universidad Industrial de Santander Colombia
Revista Integración ISSN: 0120-419X integracion@matematicasuised Universidad Industrial de Santander Colombia Gutiérrez García, Ismael; Villar Salinas, Darwin On authomorphisms of extremal type II codes
More informationx n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)
Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every
More informationDivisor matrices and magic sequences
Discrete Mathematics 250 (2002) 125 135 www.elsevier.com/locate/disc Divisor matrices and magic sequences R.H. Jeurissen Mathematical Institute, University of Nijmegen, Toernooiveld, 6525 ED Nijmegen,
More informationABSTRACT ALGEBRA 2 SOLUTIONS TO THE PRACTICE EXAM AND HOMEWORK
ABSTRACT ALGEBRA 2 SOLUTIONS TO THE PRACTICE EXAM AND HOMEWORK 1. Practice exam problems Problem A. Find α C such that Q(i, 3 2) = Q(α). Solution to A. Either one can use the proof of the primitive element
More informationPRINCIPLES OF ANALYSIS - LECTURE NOTES
PRINCIPLES OF ANALYSIS - LECTURE NOTES PETER A. PERRY 1. Constructions of Z, Q, R Beginning with the natural numbers N t1, 2, 3,...u we can use set theory to construct, successively, Z, Q, and R. We ll
More information1. Group Theory Permutations.
1.1. Permutations. 1. Group Theory Problem 1.1. Let G be a subgroup of S n of index 2. Show that G = A n. Problem 1.2. Find two elements of S 7 that have the same order but are not conjugate. Let π S 7
More informationPermutation decoding for the binary codes from triangular graphs
Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for
More informationProposition (D& F, Thm )
Proposition (D& F, Thm 10.5.33) Let Q be an R-module. The following are equivalent. (1) If 0 ãñ A ' Ñ B Ñ C Ñ 0 is exact, then so is 0 ãñ Hom R pc, Qq Ñ '1 1 Hom R pb,qq Ñ Hom R pa, Qq Ñ0. (2) For any
More informationDr. Marques Sophie Algebra 1 Spring Semester 2017 Problem Set 9
Dr. Marques Sophie Algebra Spring Semester 207 Office 59 marques@cims.nyu.edu Problem Set 9 Exercise 0 : Prove that every group of order G 28 must contain a normal subgroup of order 7. (Why should it contain
More informationKnow the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].
The second exam will be on Friday, October 28, 2. It will cover Sections.7,.8, 3., 3.2, 3.4 (except 3.4.), 4. and 4.2 plus the handout on calculation of high powers of an integer modulo n via successive
More informationUnsolved Problems in Graph Theory Arising from the Study of Codes*
Unsolved Problems in Graph Theory Arising from the Study of Codes* N. J. A. Sloane Mathematical Sciences Research Center AT&T Bell Laboratories Murray Hill, NJ 07974 1. Two fundamental questions in coding
More informationTraces of rationality of Darmon points
Traces of rationality of Darmon points [BD09] Bertolini Darmon, The rationality of Stark Heegner points over genus fields of real quadratic fields Seminari de Teoria de Nombres de Barcelona Barcelona,
More informationq-de Rham cohomology via Λ-rings
q-de Rham cohomology via Λ-rings J.P.Pridham arxiv:1608.07142 1 / 21 q-analogues (Gauss) rns q : qn 1 q 1 1 q... qn 1 rns q! : rns q... r2s q r1s q, ¹ n 1 i 0 n 1 ¹ i 0 p1 p1 n k q : rns q! rn ksq!rksq!
More informationOn The Weights of Binary Irreducible Cyclic Codes
On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:
More information17 Galois Fields Introduction Primitive Elements Roots of Polynomials... 8
Contents 17 Galois Fields 2 17.1 Introduction............................... 2 17.2 Irreducible Polynomials, Construction of GF(q m )... 3 17.3 Primitive Elements... 6 17.4 Roots of Polynomials..........................
More informationNew Inequalities for q-ary Constant-Weight Codes
New Inequalities for q-ary Constant-Weight Codes Hyun Kwang Kim 1 Phan Thanh Toan 1 1 Department of Mathematics, POSTECH International Workshop on Coding and Cryptography April 15-19, 2013, Bergen (Norway
More informationCyclotomic Cosets, Codes and Secret Sharing
Malaysian Journal of Mathematical Sciences 11(S) August: 59-73 (017) Special Issue: The 5th International Cryptology and Information Security Conference (New Ideas in Cryptology) MALAYSIAN JOURNAL OF MATHEMATICAL
More informationSymmetries of a q-ary Hamming Code
Symmetries of a q-ary Hamming Code Evgeny V. Gorkunov Novosibirsk State University Algebraic and Combinatorial Coding Theory Akademgorodok, Novosibirsk, Russia September 5 11, 2010
More informationAlgebra Qualifying Exam August 2001 Do all 5 problems. 1. Let G be afinite group of order 504 = 23 32 7. a. Show that G cannot be isomorphic to a subgroup of the alternating group Alt 7. (5 points) b.
More informationWe saw in the last chapter that the linear Hamming codes are nontrivial perfect codes.
Chapter 5 Golay Codes Lecture 16, March 10, 2011 We saw in the last chapter that the linear Hamming codes are nontrivial perfect codes. Question. Are there any other nontrivial perfect codes? Answer. Yes,
More informationLinear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x f(x) = q(x)h(x) + r(x),
Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 + + a n 1 x n 1 + a n x n, where the coefficients a 1, a 2,, a n are
More informationNOTES WEEK 04 DAY 1 SCOT ADAMS
NOTES WEEK 0 DAY 1 SCOT ADAMS DEFINITION 01 Let m, n P N, B P BpR m, R n q Let e 1,, e m be the standard basis of R m Let f 1,, f n be the standard basis of R n Then we define rbs P R nˆm by rbs ji Bpe
More informationG Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.
EE 387 October 28, 2015 Algebraic Error-Control Codes Homework #4 Solutions Handout #24 1. LBC over GF(5). Let G be a nonsystematic generator matrix for a linear block code over GF(5). 2 4 2 2 4 4 G =
More informationChapter 6 Inner product spaces
Chapter 6 Inner product spaces 6.1 Inner products and norms Definition 1 Let V be a vector space over F. An inner product on V is a function, : V V F such that the following conditions hold. x+z,y = x,y
More informationTheorem 5.3. Let E/F, E = F (u), be a simple field extension. Then u is algebraic if and only if E/F is finite. In this case, [E : F ] = deg f u.
5. Fields 5.1. Field extensions. Let F E be a subfield of the field E. We also describe this situation by saying that E is an extension field of F, and we write E/F to express this fact. If E/F is a field
More informationDouble Circulant Codes over Z 4 and Even Unimodular Lattices
Journal of Algebraic Combinatorics 6 (997), 9 3 c 997 Kluwer Academic Publishers. Manufactured in The Netherlands. Double Circulant Codes over Z and Even Unimodular Lattices A.R. CALDERBANK rc@research.att.com
More informationGALOIS THEORY. Contents
GALOIS THEORY MARIUS VAN DER PUT & JAAP TOP Contents 1. Basic definitions 1 1.1. Exercises 2 2. Solving polynomial equations 2 2.1. Exercises 4 3. Galois extensions and examples 4 3.1. Exercises. 6 4.
More informationArrangements, matroids and codes
Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde
More informationNOTES WEEK 14 DAY 2 SCOT ADAMS
NOTES WEEK 14 DAY 2 SCOT ADAMS We igligt tat it s possible to ave two topological spaces and a continuous bijection from te one to te oter wose inverse is not continuous: Let I : r0, 2πq and let C : tpx,
More informationThe average dimension of the hull of cyclic codes
Discrete Applied Mathematics 128 (2003) 275 292 www.elsevier.com/locate/dam The average dimension of the hull of cyclic codes Gintaras Skersys Matematikos ir Informatikos Fakultetas, Vilniaus Universitetas,
More informationThe Structure of 1-Generator Quasi-Twisted Codes and New Linear Codes
C Designs, Codes and Cryptography, 24, 313 326, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. The Structure of 1-Generator Quasi-Twisted Codes and New Linear Codes NUH AYDIN Department
More informationIdempotent Generators of Generalized Residue Codes
1 Idempotent Generators of Generalized Residue Codes A.J. van Zanten A.J.vanZanten@uvt.nl Department of Communication and Informatics, University of Tilburg, The Netherlands A. Bojilov a.t.bozhilov@uvt.nl,bojilov@fmi.uni-sofia.bg
More informationVariational inequality formulation of chance-constrained games
Variational inequality formulation of chance-constrained games Joint work with Vikas Singh from IIT Delhi Université Paris Sud XI Computational Management Science Conference Bergamo, Italy May, 2017 Outline
More informationCoding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013
Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved
More informationRepresentation Theory
Part II Year 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2018 Paper 1, Section II 19I 93 (a) Define the derived subgroup, G, of a finite group G. Show that if χ is a linear character
More informationPartial permutation decoding for binary linear Hadamard codes
Partial permutation decoding for binary linear Hadamard codes R. D. Barrolleta 1 and M. Villanueva 2 Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona Cerdanyola
More informationSelected Math 553 Homework Solutions
Selected Math 553 Homework Solutions HW6, 1. Let α and β be rational numbers, with α 1/2, and let m > 0 be an integer such that α 2 mβ 2 = 1 δ where 0 δ < 1. Set ǫ:= 1 if α 0 and 1 if α < 0. Show that
More informationExtending and lengthening BCH-codes
Extending and lengthening BCH-codes Jürgen Bierbrauer Department of Mathematical Sciences Michigan Technological University Houghton, Michigan 49931 (USA) Yves Edel Mathematisches Institut der Universität
More informationOn the Weight Distribution of N-th Root Codes
Fabrizio Caruso Marta Giorgetti June 10, 2009 The Recurrence Proof by Generating Functions A Computer-Generated Proof Computing Some Steps of the Recurrence A Computer-Provable Identity Proving the Guessed
More informationA Generalization of Wilson s Theorem
A Generalization of Wilson s Theorem R. Andrew Ohana June 3, 2009 Contents 1 Introduction 2 2 Background Algebra 2 2.1 Groups................................. 2 2.2 Rings.................................
More information3. Coding theory 3.1. Basic concepts
3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,
More information