A Note on Non-Existence of (8,4)-2 Burst Error Correcting Code

Similar documents
Construction of m-repeated Burst Error Detecting and Correcting Non-binary Linear Codes

Plotkin s Bound in Codes Equipped with the Euclidean Weight Function

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes

We saw in the last chapter that the linear Hamming codes are nontrivial perfect codes.

Some New Optimal Ternary Linear Codes

A REVERSIBLE CODE OVER GE(q)

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.

Can You Hear Me Now?

Cyclic codes: overview

ON PERTURBATION OF BINARY LINEAR CODES. PANKAJ K. DAS and LALIT K. VASHISHT

GRAY codes were found by Gray [15] and introduced

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013

A 2-error Correcting Code

Ma/CS 6b Class 25: Error Correcting Codes 2

Hamming Codes 11/17/04

1. How many errors may be detected (not necessarily corrected) if a code has a Hamming Distance of 6?

Coding Theory. Golay Codes

Chapter 5. Cyclic Codes

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].

Chapter 3 Linear Block Codes

THIS paper is aimed at designing efficient decoding algorithms

International Journal of Pure and Applied Sciences and Technology

MATH 291T CODING THEORY

Hamming codes and simplex codes ( )

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)

proposed. This method can easily be used to construct the trend free orthogonal arrays of higher level and higher strength.

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014

Improved Upper Bounds on Sizes of Codes

Orthogonal Arrays & Codes

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction

exercise in the previous class (1)

Implementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005

Greedy Codes. Theodore Rice

On Locating-Dominating Codes in Binary Hamming Spaces

On non-antipodal binary completely regular codes

MT5821 Advanced Combinatorics

Codes over Subfields. Chapter Basics

Linear Codes and Syndrome Decoding

ORTHOGONAL ARRAYS OF STRENGTH 3 AND SMALL RUN SIZES

THE PROBLEM OF DIOPHANTUS AND DAVENPORT FOR GAUSSIAN INTEGERS. Andrej Dujella, Zagreb, Croatia

Feasible star delta and delta star transformations for reliability networks

Correcting Codes in Cryptography

Chapter 6. BCH Codes

ELEC-E7240 Coding Methods L (5 cr)

Divisibility of Trinomials by Irreducible Polynomials over F 2

Modular numbers and Error Correcting Codes. Introduction. Modular Arithmetic.

Number Theory and Graph Theory

MATH 291T CODING THEORY

Characterizations of Strongly Regular Graphs: Part II: Bose-Mesner algebras of graphs. Sung Y. Song Iowa State University

Chapter 2. Divisibility. 2.1 Common Divisors

Tilings of Binary Spaces

ELEC 405/ELEC 511 Error Control Coding and Sequences. Hamming Codes and the Hamming Bound

Finite Mathematics. Nik Ruškuc and Colva M. Roney-Dougal

HW 4 SOLUTIONS. , x + x x 1 ) 2

A Proposed Quantum Low Density Parity Check Code

Galois geometries contributing to coding theory

Optimum Soft Decision Decoding of Linear Block Codes

Some Perfect Pythagorean Triangles Where Their Perimeters Are Quarternary Numbers

On Weight Distributions of Homogeneous Metric Spaces Over GF (p m ) and MacWilliams Identity

ERROR-CORRECTING CODES AND LATIN SQUARES

Given any simple graph G = (V, E), not necessarily finite, and a ground set X, a set-indexer

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x

Construction of optimal Two- Level Supersaturated Designs

(k, l)-universality OF TERNARY QUADRATIC FORMS ax 2 + by 2 + cz 2

REED-SOLOMON CODE SYMBOL AVOIDANCE

Special Pythagorean Triangles and Pentagonal Numbers

11 Minimal Distance and the Parity Check Matrix

Error Correction Methods

ELEC 405/ELEC 511 Error Control Coding. Hamming Codes and Bounds on Codes

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.

Galois geometries contributing to coding theory

Lebesgue Measure and The Cantor Set

Dr. Cathy Liu Dr. Michael Steinberger. A Brief Tour of FEC for Serial Link Systems

THE TRIANGULAR THEOREM OF THE PRIMES : BINARY QUADRATIC FORMS AND PRIMITIVE PYTHAGOREAN TRIPLES

Constructing c-ary Perfect Factors

Some error-correcting codes and their applications

Vector spaces. EE 387, Notes 8, Handout #12

Finite fields: some applications Michel Waldschmidt 1

NPTEL web course on Complex Analysis. A. Swaminathan I.I.T. Roorkee, India. and. V.K. Katiyar I.I.T. Roorkee, India

Introduction to proofs. Niloufar Shafiei

B. Cyclic Codes. Primitive polynomials are the generator polynomials of cyclic codes.

Answers and Solutions to (Even Numbered) Suggested Exercises in Sections of Grimaldi s Discrete and Combinatorial Mathematics

Implementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes

Lecture 12. Block Diagram

Block-Wise Density Distribution of Primes Less Than A Trillion in Arithmetical Progressions 11n + k

Vector Spaces. distributive law u,v. Associative Law. 1 v v. Let 1 be the unit element in F, then

On the Nonexistence of Perfect 2- and 3-Hamming-Error-Correcting Codes over GF(q)

Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm

Division of Trinomials by Pentanomials and Orthogonal Arrays


NOTES (1) FOR MATH 375, FALL 2012

8+4 0 mod (12), mod (12), mod (12), mod (12), mod (12).

We want to show P (n) is true for all integers

Secret-sharing with a class of ternary codes

Circulant Hadamard matrices as HFP-codes of type C 4n C 2. arxiv: v1 [math.co] 26 Nov 2017

Algebra for error control codes

Error Correction Review

Number Theory. Final Exam from Spring Solutions

Chapter 1 The Real Numbers

Transcription:

Applied Mathematical Sciences, Vol. 4, 2010, no. 44, 2201-2205 A Note on Non-Existence of (8,4)-2 Burst Error Correcting Code Navneet Singh Rana Research Scholar, Department of Mathematics University of Delhi, Delhi-110007, India nsrana13@hotmail.com Abstract This paper presents the non-existence of (8,4)-2 burst error correcting perfect code over GF(2). An (n,k) linear code is said to be perfect if for some positive integer b, it corrects all b and fewer errors and no more. Mathematics Subject Classification: 94B20 Keywords: Perfect codes, Burst-error, Parity-check matrix, Hamming weight 1. INTRODUCTION Fire (1959) gave the lower bound on the number of parity check digits required in a linear code over GF(q) that corrects all bursts of length b or less as follows: n k b 1 q q [(q 1)(n b+1)+1]. (1.1) A code will be b-burst error correcting perfect, if it corrects all the burst errors of length b or less and satisfies the equality n k b 1 q = q [(q 1)(n b +1) +1]. (1.2) The problem of non-existence of linear as well as perfect codes has been a good exercise for mathematicians for the last several years. The Non-Existence of Certain Binary Linear (n, k)-codes with different values of the parameters n and k satisfying equation (1.2) was given by Hill and Traynor [2]. Also, the nonexistence of ternary linear codes has been given by Eupen [4], Dasakalov and Metodia [8]. However, the non-existence of (n, k)-perfect codes have been proved in a series of papers by Eupen [5], Hamada and Watamori [6] and Landjev [3]. The non-existence of Ternary perfect codes were obtained in [7] and also it has

2202 N. Singh Rana been mentioned by Tuvi Etzion [9], that (8,4)-2 burst correcting perfect code does not exist. In this small note, we prove by using parity check construction technique, that (8,4)-2 burst error correcting perfect code does not exist. 2. NON-EXISTENCE OF (8,4)-2 BURST ERROR CORRECTING CODE OVER GF(2) To explore the possibility of existence of burst error correcting perfect codes, it is evident that equation (1.2) must have integral solutions for q, n, k and b. Though (8,4)-Code satisfies the equation (1.2) for b=2 and q=2, however, we illustrate in our next result that it is not possible to form a parity check matrix for this code. Result: (8,4)-2 burst error correcting code over GF(2) does not exist. Proof: We prove this theorem by assuming that such codes exists. So let us suppose that H denotes the parity check matrix for (8, 4)-2 burst errorcorrecting code. Since n k = 4, therefore, the most trivial way in which the first four columns of H can be constructed, is to take the binary representation of the numbers 1, 2, 2 2, 2 3 i.e. (0 0 0 1), (0 0 1 0), (0 1 0 0) and (1 0 0 0) columnwise. Suppose we take H as 0 0 0 1 0 1 0 x 0 0 1 0 1 1 1 y H = 0 1 0 0 0 1 1 z 1 0 0 0 1 0 1 w. Let S denote the set of all the non-zero 4-tuples over GF(2). Then S = GF(2) 4 ~ {(0, 0, 0, 0)} S = 2 4 1 = 15 Let A denote the set of all the syndromes corresponding to the error pattern of first seven columns (i.e. 1 st -2 nd, 2 nd -3 rd, 3 rd -4 th, 4 th -5 th, 5 th -6 th and 6 th -7 th, including the vector (0 1 1 1)) of H. Then (0 0 0 1), (0 0 1 0), (0 0 1 1), (0 1 0 0), (0101), (0110), (0111), (1000), A = (1 0 0 1), (1 0 1 1), (1 1 0 0), (1 1 0 1), (1 1 1 0) Also if B = S ~ A, then B = {(1010), (1111)}

Non-existence of (8,4)-2 burst error correcting code 2203 Therefore A = 13 and B = 2 Clearly S = A B and A B = φ So that S = A + B. Then for H to be the parity check matrix of (8,4)-2 burst error correcting code, each of the two elements in the set C ( set of all the syndromes corresponding to 7 th and 8 th columns of H including the vector (x y z w)) given by C = {(x y z w), (x y +1 z + 1 w + 1)}, must not belong to A. So in order to prove that the above code exist, we must have C B ( Q S= A B and A B =φ) But if we take the element (x y + 1 z + 1 w + 1) of C in B, then we always arrive at a contradiction. For example, if we take (x y + 1 z + 1 w +1) in B as (1 0 1 0), then we have (x y+1 z+1 w+1) = (1 0 1 0) x = 1, y = 1, z = 0, w = 1 (x y z w) = (1 1 0 1) (x y z w ) A This is a contradiction to our assumption that (x y z w ) A. Similarly if we take (x y+1 z+1 w+1) in B as (1 1 1 1), then again we get a contradiction. Therefore it is not possible to add the eighth column in H and hence we are unable to find H which may yield different syndromes in the respective errorpattern syndrome table. Hence the result. 3. OBSERVATIONS By considering equation (1.2) i.e. we get n k b 1 q q [(q 1)(n b 1) 1] = + +, (n k) (b 1) q + (q 1)b q For determining n, the code length, and k, the number of information digits for a code over GF(q), we assign different values to b as follows: (i) b = 1: Equation (3) reduces to (n k) q 1 (3.1) q 1 (3)

2204 N. Singh Rana It is well known that this equation has infinitely many solutions and corresponding to every solution there is a single error correcting perfect code viz. Hamming code. (ii) b = 2 : Equation (3) reduces to (n k) 1 q + (q 2) (3.2) Clearly equation (3.2) has infinitely many integral solutions, which shows the possibility of the existence of 2-burst error correcting perfect codes. (iii) b = 3: Equation(3) reduces to (n k) 2 q + (2q 3) (3.3) which leads to the similar assertion as in the above two cases, leading to the possibility of the existence of 3-burst error correcting perfect codes. Continuing in this manner it is evident that for higher values of b viz. b = 4,5,... equation (3) has infinitely many solutions. Based on this study it may be observed that there does exist a class of perfect codes for a fixed value of b. Such codes correct only b-adjacent errors for fixed b and have been studied by Sharma & Dass [1]. 4. CONCLUSION AND REMARKS We have investigated the solutions of equation (1.2) for b = 1, 2, 3,... (Section 3) and it is hoped that equation (1.2) shall have solutions for higher values of b also, leading to the possibilities of the existence of perfect codes. Acknowledgement The author is thankful to Dr. V.K. Tyagi (Department of Mathematics, Shyam Lal College (E), University of Delhi), for his suggestions and illuminating discussions on this paper. REFERENCES 1. B.D. Sharma and B.K. Dass, 'Adjacent-Error Correcting Binary Perfect Codes, Journal of Cybernetics', 7 (1977), 9-13. 2. H. Raymond and T. Karen, The Non-existence of Certain Binary Linear Codes ; IEEE Transactions on Information Theory, 36(4) (1990), 917-922. 3. I. Landjev, The Non-existence of Some Optimal Ternary Codes of Dimension Five'; Designs Codes Cryptography, 15 (1998), 245-258.

Non-existence of (8,4)-2 burst error correcting code 2205 4. M.V. Eupen, Four Non-Existence Results for Ternary Linear Codes ; IEEE Transactions on Information Theory, 41(3) (1995), 800-805. 5. M.V. Eupen, 'Some New Results for Ternary Linear Codes of Dimension 5 and 6'; IEEE Transactions on Information Theory, 41 (1995), 2048-2051. 6. N. Hamada and Y. Watamori, The Non-existence of [71, 5, 46] 3 Codes'; J. Statistical Planning Inference. 52 (1996), 379-394. 7. R. Dasakalov and E. Metodia, The Non-existence of Ternary [105, 6, 68] and [230, 6, 152] codes'; Discrete Mathematics, 286 (2004), 225-232. 8. R. Dasakalov and E. Metodia, The Non-existence of Ternary [284, 6, 188] Codes ; Problems of Information Transmission 40(2) (2004), 135-146. 9. T. Etzion, Constructions for Perfect 2-Burst Correcting Codes ; IEEE Transactions on Information Theory, 47(6) (2001), 2553-2555. Received: November, 2009