M 2 + s 2. Note that the required matrix A when M 2 + s 2 was also obtained earlier by Gordon [2]. (2.2) x -alxn-l-aex n-2 an

Similar documents
On the construction of asymmetric orthogonal arrays

PETERSON'S TABLE OF IRREDUCIBLE POLYNOMIALS OVER GF(2)

Construction of some new families of nested orthogonal arrays

New algebraic decoding method for the (41, 21,9) quadratic residue code

Trace Representation of Legendre Sequences

An Application of Coding Theory into Experimental Design Construction Methods for Unequal Orthogonal Arrays

Ranks of Hadamard Matrices and Equivalence of Sylvester Hadamard and Pseudo-Noise Matrices

Generalized hyper-bent functions over GF(p)

CONSTRUCTION OF SLICED SPACE-FILLING DESIGNS BASED ON BALANCED SLICED ORTHOGONAL ARRAYS

Vector spaces. EE 387, Notes 8, Handout #12

Some approaches to construct MDS matrices over a finite field

PAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES

G Solution (10 points) Using elementary row operations, we transform the original generator matrix as follows.

Permutation decoding for the binary codes from triangular graphs

On Construction of a Class of. Orthogonal Arrays

Plotkin s Bound in Codes Equipped with the Euclidean Weight Function

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

ON PERTURBATION OF BINARY LINEAR CODES. PANKAJ K. DAS and LALIT K. VASHISHT

1182 L. B. Beasley, S. Z. Song, ands. G. Lee matrix all of whose entries are 1 and =fe ij j1 i m 1 j ng denote the set of cells. The zero-term rank [5

SPHERE PACKINGS CONSTRUCTED FROM BCH AND JUSTESEN CODES

Construction of Galois Fields of Characteristic

Binomial coefficient codes over W2)

General error locator polynomials for binary cyclic codes with t 2 and n < 63

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets

Constructions of Quadratic Bent Functions in Polynomial Forms

Finite Fields. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach

DICKSON POLYNOMIALS OVER FINITE FIELDS. n n i. i ( a) i x n 2i. y, a = yn+1 a n+1 /y n+1

The matrix will only be consistent if the last entry of row three is 0, meaning 2b 3 + b 2 b 1 = 0.

A GENERAL POLYNOMIAL SIEVE

An Analytic Approach to the Problem of Matroid Representibility: Summer REU 2015

Extending and lengthening BCH-codes

proposed. This method can easily be used to construct the trend free orthogonal arrays of higher level and higher strength.

a 11 x 1 + a 12 x a 1n x n = b 1 a 21 x 1 + a 22 x a 2n x n = b 2.

arxiv: v1 [cs.it] 12 Jun 2016

Binary Convolutional Codes of High Rate Øyvind Ytrehus

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)

On GMW designs and a conjecture of Assmus and Key Thomas E. Norwood and Qing Xiang Dept. of Mathematics, California Institute of Technology, Pasadena,

ELEMENTARY LINEAR ALGEBRA

Some long-period random number generators using shifts and xors

Cryptanalysis of a key exchange protocol based on the endomorphisms ring End(Z p Z p 2)

STABLY FREE MODULES KEITH CONRAD

GRE Subject test preparation Spring 2016 Topic: Abstract Algebra, Linear Algebra, Number Theory.

Example. We can represent the information on July sales more simply as

Rings. EE 387, Notes 7, Handout #10

Orthogonal Arrays & Codes

GF(2 m ) arithmetic: summary

INVARIANT IDEALS OF ABELIAN GROUP ALGEBRAS UNDER THE MULTIPLICATIVE ACTION OF A FIELD, II

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

Third-order nonlinearities of some biquadratic monomial Boolean functions

QUALITATIVE CONTROLLABILITY AND UNCONTROLLABILITY BY A SINGLE ENTRY

FIBONACCI DIOPHANTINE TRIPLES. Florian Luca and László Szalay Universidad Nacional Autonoma de México, Mexico and University of West Hungary, Hungary

New Constructions for De Bruijn Tori

The Hamming Codes and Delsarte s Linear Programming Bound

Correcting Codes in Cryptography

A Relation Between Weight Enumerating Function and Number of Full Rank Sub-matrices

Applied Mathematics Letters. Comparison theorems for a subclass of proper splittings of matrices

Some Easily Decoded, Efficient, Burst Error Correcting Block Codes

USING GRAPHS AND GAMES TO GENERATE CAP SET BOUNDS

MATRIX ALGEBRA. or x = (x 1,..., x n ) R n. y 1 y 2. x 2. x m. y m. y = cos θ 1 = x 1 L x. sin θ 1 = x 2. cos θ 2 = y 1 L y.

Fundamental Theorem of Algebra

Applied and Computational Harmonic Analysis 11, (2001) doi: /acha , available online at

ECEN 5022 Cryptography

Intrinsic products and factorizations of matrices

A Short Overview of Orthogonal Arrays

An Explicit Similarity Transform between Cellular Automata and LFSR Matrices*

A Proposed Quantum Low Density Parity Check Code

Cyclic codes: overview

Hamilton Cycles in Digraphs of Unitary Matrices

A Questionable Distance-Regular Graph

Codes over Subfields. Chapter Basics

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM)

Construction of Barnes-Wall Lattices from Linear Codes over Rings

Math Camp Lecture 4: Linear Algebra. Xiao Yu Wang. Aug 2010 MIT. Xiao Yu Wang (MIT) Math Camp /10 1 / 88

On the Linear Complexity of Feedback Registers

Extending MDS Codes. T. L. Alderson

1 Linear Algebra Problems

Nonlinear Cyclic Codes over Z 4 whose Nechaev-Gray Images are Binary Linear Cyclic Codes

Chapter 6 Lagrange Codes

Construction X for quantum error-correcting codes

Structured Low-Density Parity-Check Codes: Algebraic Constructions

PAPER A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes

IN this paper, we will introduce a new class of codes,

Extended Binary Linear Codes from Legendre Sequences

Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes

Chapter 3: Theory Review: Solutions Math 308 F Spring 2015

Sample algebra qualifying exam

QUADRATIC RESIDUE CODES OVER Z 9

f (D) = 1 chdh h=o DESIGN OF MULTILEVEL PSEUDORANDOM SIGNALS

The cocycle lattice of binary matroids

~ g-inverses are indeed an integral part of linear algebra and should be treated as such even at an elementary level.

MATH 2331 Linear Algebra. Section 1.1 Systems of Linear Equations. Finding the solution to a set of two equations in two variables: Example 1: Solve:

Quasi-reducible Polynomials

CCZ-equivalence and Boolean functions

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring

On some matrices related to a tree with attached graphs

APPENDIX A. Background Mathematics. A.1 Linear Algebra. Vector algebra. Let x denote the n-dimensional column vector with components x 1 x 2.

On Two Probabilistic Decoding Algorithms for Binary Linear Codes

SUMS OF SECOND ORDER LINEAR RECURRENCES THOMAS MCKENZIE AND SHANNON OVERBAY

Transcription:

SIAM J. ALG. DISC. METH. Vol. 1, No. 1, March 1980 1980 Society for. Industrial and Applied Mathematics 0196-52/80/0101-0014 $01.00/0 ON CONSTRUCTION OF MATRICES WITH DISTINCT SUBMATRICES* SHARAD V. KANETKAR" AND MEGHANAD D. WAGH: Abstract. Given N, M, and s, a method of generating an N xm binary matrix such that every nonzero x s binary pattern occurs exactly once as its submatrix is presented. This construction is based upon a systematic filling of the matrix with a maximal length recurrent sequence and gives several new solutions yet unreported. 1. Introduction. In this paper we consider the problem of construction of an N x M binary matrix A such that any s nonzero binary pattern occurs exactly once as its submatrix. Similar problems have been attempted earlier by various authors. Reed and Stewart [5] considered the existence of A given only and s. Gordon [2] later extended their result and showed that given any and s, one can always find N and M, N > t, M > s such that all s submatrices (in the toroidal sense) in A are distinct. A is then called a perfect map. All the s nonzero binary patterns are not necessarily the submatrices of a perfect map. However, a perfect map with parameters M 2 1 and N (2 s - 1)/M and containing all the x s nonzero binary patterns was exhibited in ]. When N and M are relatively prime, a pseudorandom array also gives a perfect map with the same parameters [3]. The toroidal perfect maps of [2], [3] and [5] can be easily converted into nontoroidal ones by repeating the first t- 1 rows after the last row and the first s- 1 columns after the last column. In this paper, we will be concerned only with N x M nontoroidal perfect map A in which every nonzero binary s pattern occurs exactly once as a submatrix. Obviously, the four parameters are then related as (1.1) (M-s + 1)(N- + 1)= 2 st- 1. Banerji [1] has recently described a procedure of designing A when (i) M s and (ii) M 2 + s 2. Note that the required matrix A when M 2 + s 2 was also obtained earlier by Gordon [2]. In this paper, we give a criterion for filling up the matrix A with a maximal length recurrent sequence (MLRS) such that A will have the required property. Four schemes have been described which satisfy the criterion and hence generate A for all the earlier known cases and for several new ones. This criterion also enables one to construct A for any M, N, s and satisfying (1.1). We have included here the solution to the problem (for all the possible parameter combinations with st <-15) obtained by a computer search made easy with the help of the criterion. 2. Preliminaries. A linear recurrent sequence {Xi} of the elements of GF(q), (q" a prime power) of period q"-1 may be obtained from the recurrence relation (2.1) Xi alxi-1% a2xi-2-1- --l.- anxi--n over GF(q) with arbitrary nonzero initial condition if the constants a l, a2,, an GF(q) are chosen such that the polynomial (2.2) x -alxn-l-aex n-2 an is primitive over GF(q). We will use the following property of this maximal length recurrent sequence (MLRS). * Received by the editors November 13, 1978, and in revised form July 13, 1979. f Computer Centre, Indian Institute of Technology, Bombay 400 076, India. t Department of Electrical Engineering, Indian Institute of Technology, Bombay 400 076, India. Now at Department of Electrical Engineering, Concordia University, 1455 de Maisonneuve Blvd. West, Montreal H3G 1M8, Canada. 107

108 SHARAD V. KANETKAR AND MEGHANAD D. WAGH LEMMA 1. Let be the root of the polynomial (2.2) and il, i2, i,, any n integers such that i1,i2,...,fli. are linearly independent over GF(q). Then the n-tuple (xi+il, xi+i," xi+i.) assumes all the nonzero values exactly once in the range 0 <-i <- qn -2. Proof. Solution of (2.1) can be expressed as [6] xi=tr(bi), where Tr denotes the trace function Tr (a)=a +a q +aq+.+a from GF(q n) onto GF(q) and b GF(q) is determined by the initial conditions. Then xiti I LXi+in] [i,+ The matrix on the right-hand side is nonsingular over GF(q) as the elements in the first column are linearly independent by assumption. Thus there is a one-one correspondence between the n-tuple (xi+i, xi+i,, x/.) and the quantity b i. But as fl is the primitive element of GF(q"), bfl and hence (xi+i, x+i,", xi+i.) takes all the possible q" 1 nonzero values as runs over 0 <_- <_- q" 2. Since we are interested in binary matrices we will restrict ourselves to q 2. However it should be mentioned that the methods developed in this paper can be generalized to the case of matrices with q symbols. Consider an MLRS {xi} of period 2 st- 1 generated by (2.1) with n st. We now state the central result of this paper. THEOREM 1. IfA is filled as such that A(u, v) x(+,+>, 0<=u <_-N-l, O_<_v <-M-l, (C1) (C2) (C3) f is linear in u and v; when u and v are restricted to O <-_ u <=N-t, O <- v <=M- s, f(u, v)arealldistinct modulo 2 st- 1; flr(u.v), 0 < u < t- 1, 0 < v < s 1 are all linearly independent over GF(2) where fl is the root of (2.2) with n st; then each binary x s pattern occurs as a submatrix of A exactly once. Proof. Denoting f(u,v), O<-u<-t-1, O<-v<-s-1 by il, i2, ",is,, it is obvious from (C1) that any s submatrix in A with its left-hand top corner at (u, v) has elements Xi+il, Xi+i2, ", Xi+ist where f(u, v). Further, as u, v run over 0 <= u _-< N and 0 _-< v _-< M s, (i.e., all possible coordinate values taken by the left hand top corners of s submatrices), runs over 0 to 2 st 2 because of (C2) and (1.1). Finally, from (C3),/3 q, fli2,..., flis, are linearly independent over GF(2) and hence an application of Lemma 1 gives the required result.

CONSTRUCTION OF MATRICES 109 3. Generation of A matrix. Several schemes to fill up A to satisfy the conditions (C1)-(C3) may be given. Scheme 1. f(u,v)=u+tv, O<-u<-2st+t-3, O<=v<=s-1 generates a matrix A with N 2 st + t- 2 and M s. Here, (C1) is obvious. To check (C2), note that for O<-u<-N-t, O<-v<-_M-s=O, f(u,v)=u and therefore in this range all f(u, v) are distinct modulo 2 st 1. Finally, the set {flr(u o)[0 u _-< 1, 0 _-< v -<_ s 1} is {1, fl,/2,...,/,-1} elements of which are necessarily linearly independent over GF(2) giving (C3). The generated matrix A will then have the desired properties by Theorem 1. This leads to Banerji s case (i). The mappings f(u, v) (M s + 1) u + v (H mapping) f(u, v)= u +(N-t+ 1)v 0_<u_<_N-1, (V mapping) O <v_<m-1, obviously satisfy (C1). In the case of H mapping, when u and v are restricted to O<=u<-_N-t, O<_v <-M-s, one gets 0-f(u, v)_-<2-2 by using (1.1). Thus, if in this range f(ul, Vl)=-f(uz, v2) (mod 2 t- 1), then (M-s + 1)(Ul-U2)=(v2-Vl). But, M- s + 1 cannot divide v2-vl (as 0_-<Vl, v2<-m-s) unless v2= vl and in that case Ux also equals u2. Thus f(u, v) are distinct modulo 2-1 in this range showing that (C2) is satisfied. Similarly, V mapping also can be shown to satisfy (C2). We now present three more schemes based on H and V mappings which satisfy (C3). Scheme 2. When 1, choosing H mapping, the set {/3r(u v)10_<-u _-<t-1 =0, 0_-< v _-<s 1} is {1, fl, flz,..., fls-1}. Its elements are linearly independent over GF(2) as/3 is the primitive element of GF(2S ). Thus (C3) is satisfied and the matrix generated will have the required properties. Scheme 3. When M 2s- 1, using H mapping, f(u, v)= su + v. Then the set {/r(" v)[0-<_ u -<_ t- 1, 0-<_ v <- s 1} {1,/,/2,..., [3st--l} has elements which are linearly independent over GF(2) as fl is the primitive element of GF(2 ). Thus (C3) is satisfied and one gets the matrix with the required properties. Scheme 4. Let z (2 s - 1)/(2 1) and ] any integer satisfying/ [(2 1) and (3.1) (2a- 1), 0<d<s. I When A has dimensions N z] + t- 1 and M (2 1)/] + s 1, one may use V mapping. Then f(u, v)= u + z]v. To check (C3) one should prove the linear independence over GF(2) of the elements of {flu+zj[0-< u <_-t-1, 0_-< v _-<s-1}. Note that flz GF(2s) and (3.1) implies that flzj does not belong to any subfield of GF(2). In other words, 1, fli, fl-i,,/(+)i are linearly independent over GF(2) because otherwise /3 i will satisfy a polynomial of degree-<_s-1 over GF(2) implying 2 belongs to a proper sub,field of GF(2 ). Further, 1,/3,/3,..-,/3 are also linearly independent over GF(2 because/3 cannot satisfy a polynomial of degree less than over GF(2). Now if a linear combination of/3 "+zi is equal to zero, then t--1 s-1 0=2 Eau,fl u=0 s--1 tl ( Bu E au,fl "v) u=0 v=0 au s GF(2).

110 SHARAD V. KANETKAR AND MEGHANAD D. WAGH The result of the inner summation belongs to GF(2S). But as {13ulo<-_u <-_t-1} are linearly independent over GF(2S), one has from this s-1 0= Y. auo iv u=0 which, from the linear independence of {B z10 <_- v <-s-1} over GF(2) gives auv 0, 0_-< u-<t--1, 0_<- v_-<s-1. Thus (C3) is satisfied and A will have the required property. /" 1 trivially satisfies (3.1) and gives dimensions identical to Banerji s case (ii). Table 1 lists the possible values of/" for 1 -<s -<_ 18 satisfying (3.1). Each gives a matrix with distinct parameters. Example. To illustrate Scheme 4, consider 2 and s 4. One then has z 17 and by choosing/" 3, N 52 and M 8. The required 52 x 8 binary matrix A may be obtained by A(u,v)=x+slv, 0_-<u-<51, 0-<_v_-<7, where {xi} is obtained from the recurrence relation over GF(2): Xi Xi-1 + Xi-2 + Xi-7 "+" Xi-8 (For a list of primitive polynomials over GF(2), refer to [4]). With the initial conditions x0 xl x6 0, x7 1, one gets the MLRS as 0 0 0 0 0 0 0 1 1 0 1 1 0 1 0 1 0 0 TABLE 1 Allowed values of] for s <= 18 allowed 1 1 2 3 1 4 1,3 5 1 6 1,3,7 7 1 8 1, 3, 5, 15 9 1,7 10 1, 3, 11, 31, 93 11 1 1, 3, 5, 7, 9, 13, 15, 21, 35, 39, 45, 63, 91, 105, 117, 315 13 1 14 1, 3, 43, 7, 381 15 1, 7, 31,151,217 16 1, 3, 5, 15, 17, 51, 85, 255 17 1 18 1, 3, 7, 9, 19, 21, 27, 57, 63, 73, 133, 171,189, 219, 399, 511,657, 1197, 1387, 1533, 1971, 4599, 9709, 13797

CONSTRUCTION OF MATRICES 111 We give below the transpose of the required matrix whose rows, for convenience, have been coded in right justified octal representation. 0 0 0 6 6 5 0 4 5 7 1 3 0 4 3 1 4 3 1 4 1 4 0 7 3 0 2 5 4 4 7 1 6 5 3 7 1 7 3 3 1 7 0 6 5 6 2 0 7 5 6 7 5 0 0 1 0 0 5 5 7 4 6 7 0 5 6 4 6 2 5 2 0 2 2 1 2 0 4 6 4 3 7 2 6 4 5 1 7 6 0 0 0 6 6 5 0 4 5 7 1 3 0 4 3 1 4 3 1 4 1 4 0 7 3 0 2 5 4 4 7 1 6 5 3 7 1 7 3 3 1 7 0 6 5 6 2 0 7 5 6 7 5 0 4. Solutions for ts <_- 15. The schemes described in the last section do not provide matrix A for all possible combinations of the four parameters satisfying (1.1). However in the cases not covered under the schemes, it may still be possible to obtain the required A matrix by utilizing the V or H mappings described earlier (which already satisfy (C1) and (C2) and finding a primitive polynomial of degree st such that (C3) is also satisfied. This calls for only a checking of linear independence over GF(2) of st different powers of ft. With the tables of primitive polynomials already available [4], this task can be performed very rapidly with the help of a computer. We have made a computer search based on this and have obtained solutions in all the cases for ts <-15. The results given in Table 2 provide ready design data in these cases. In this table the entries in the column mapping denote either H mapping or V mapping described in 3. N- + 1 takes all values dividing 2 st- 1. M can be computed using (1.1). The primitive polynomials used are: P1 x6d-x -t- 1, P2 xs+x5+x3+x+l, P3 10 x + x 3 + 1, lo P4 x +X4+X 3 +X + 1, P5 x +x6+xn+x+l, P6 x -bx 11 -+-X 9 q- xs-[- x 7 q- x 5 -[- X2 q- x q- 1, P7 x 1, P8 x P9 x 14 PIO" x 15 Pll" x 15 P" x -- "q- X 11 "+" X 10 " X 8 "q- X 6 "q" X 4 "if" X 3 "q- X +X 11 "]- X 6 "l- X 4 "q- X 2 4r" X -I - 1, - "q-x 11 +X 9 q-x 7 q-x6+x5"q 1, + X d- X 9 8 q- X X 6 "if- X 3 q - 1, q-x 13 "+ X 11 -[-X 7 q-x 6 " X 5-1- X 4 -[-X 3 q-x2d-x "b 1, d-x 14 q- X "+" X 9 q" xs " X6-t" X 4 -[" X 3 dt" X2-[- X q- 1. In the cases under Schemes 3 or 4, any primitive polynomial of degree st may be used. The cases when either N + 1 1 (or M s + 1 1) or 1 (or s 1) are not included in the table as they can be directly obtained from Schemes 1 and 2 respectively.

1 SHARAD V. KANETKAR AND MEGHANAD D. WAGH TABLE 2 Design o1 A matrix when ts <-_ 15 N + Mapping Polynomial 2 2 5 V Any (Scheme 4) 2 3 2 4 3 3 2 5 2 6 7 H P1 9 V Any (Scheme 4) 21 H Any (Scheme 3) 5 H P2 15 H P2 17 V Any (Scheme 4) 51 V Any (Scheme 4) 7 H Any (Scheme 4) 73 V Any (Scheme 4) 11 V P3 31 H P3 33 V Any (Scheme 4) 93 H P4 5 V P6 7 H P8 9 H P7 13 H P8 15 H P9 21 H P7 35 H P8 39 H P8 45 H P6 63 H P9 85 V Any (Scheme 4) 91 H P8 105 H P8 117 H P7 195 V Any (Scheme 4) 273 H P8 315 H P9 455 V Any (Scheme 4) 585 H P8 3 V Any (Scheme 3) 5 V P5 7 H Any (Scheme 4) 9 V P5 13 V P5 15 V P6 21 V P5 35 V P6 39 H P6 45 V P7 63 H P7

CONSTRUCTION OF MATRICES 113 TABLE 2 (Contd.) N + Mapping Polynomial 85 V P5 91 H P8 105 V P5 117 H P5 195 V P5 273 V Any (Scheme 4) 315 V P9 455 V P5 585 H P5 819 V Any (Scheme 4) 43 H P10 7 H P10 9 V Any (Scheme 4) 381 H P10 3 5 7 H Any (Scheme 4) 31 H Pll 151 V Pll 217 V 1057 V Pll Any (Scheme 4) 4081 H P REFERENCES [1] R. B. BANERJI, The construction of binary matrices with distinct submatrices, IEEE Trans. Computers, C-27 (1978), pp. 162-164. [2] B. GORDON, On the existence of perfect maps, IEEE Trans. Information Theory, IT- (1966), pp. 486-487. [3] F. J. MACWILLIAMS AND N. J. A. SLOANE, Pseudo-random sequences and arrays, Proc. IEEE, 64 (1976), pp. 1715-1729. [4] W. W. PETERSON AND E. J. WELDON, JR, Error Correcting Codes, MIT Press, Cambridge, MA, 1972. [5] I. S. REED AND R. M. STEWART. Note on the existence ofperfect maps, IEEE Trans. Information Theory, IT-8 (1962), pp. 10-. [6] J. H. VAN LINT, Coding Theory, Springer-Verlag, Berlin, 1971. [7] J. H. VAN LINT, F. J. MACWILLIAMS AND N. J. m. SLOANE, On pseudo-random arrays, SIAM J. Appl. Math., 36 (1979), pp. 62-72.