Binomial coefficient codes over W2)

Similar documents
Generalized hyper-bent functions over GF(p)

NOTE ON CYCLIC DECOMPOSITIONS OF COMPLETE BIPARTITE GRAPHS INTO CUBES

Tewodros Amdeberhan, Dante Manna and Victor H. Moll Department of Mathematics, Tulane University New Orleans, LA 70118

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].

T linear programming to be applied successfully to error-correcting

Sums of diagonalizable matrices

Algebra. Modular arithmetic can be handled mathematically by introducing a congruence relation on the integers described in the above example.

GRE Subject test preparation Spring 2016 Topic: Abstract Algebra, Linear Algebra, Number Theory.

Construction of a (64, 2 37, 12) Code via Galois Rings

Mathematics for Cryptography

M 2 + s 2. Note that the required matrix A when M 2 + s 2 was also obtained earlier by Gordon [2]. (2.2) x -alxn-l-aex n-2 an

Partition of Integers into Distinct Summands with Upper Bounds. Partition of Integers into Even Summands. An Example

Pseudo-Random Numbers Generators. Anne GILLE-GENEST. March 1, Premia Introduction Definitions Good generators...

Name (please print) Mathematics Final Examination December 14, 2005 I. (4)

Chung, F., P. Diaconis and R. Graham, Universal cycles for combinatorial structures, Discrete Mathematics 110 (1992) 43-59

AN ALGEBRAIC INTERPRETATION OF THE q-binomial COEFFICIENTS. Michael Braun

Finite Mathematics. Nik Ruškuc and Colva M. Roney-Dougal

Combinatorics of non-associative binary operations

Relations. Binary Relation. Let A and B be sets. A (binary) relation from A to B is a subset of A B. Notation. Let R A B be a relation from A to B.

On Subsets with Cardinalities of Intersections Divisible by a Fixed Integer

ax b mod m. has a solution if and only if d b. In this case, there is one solution, call it x 0, to the equation and there are d solutions x m d

HAMMING DISTANCE FROM IRREDUCIBLE POLYNOMIALS OVER F Introduction and Motivation

Sloping Binary Numbers: A New Sequence Related to the Binary Numbers

Counting k-marked Durfee Symbols

Elementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q),

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

CONGRUENCES FOR GENERALIZED FROBENIUS PARTITIONS WITH AN ARBITRARILY LARGE NUMBER OF COLORS

Week 15-16: Combinatorial Design

The Witt designs, Golay codes and Mathieu groups

Upper Bounds for Stern s Diatomic Sequence and Related Sequences

Exponentiation and Point Multiplication. Çetin Kaya Koç Spring / 70

The cocycle lattice of binary matroids

MATH 433 Applied Algebra Lecture 4: Modular arithmetic (continued). Linear congruences.

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS. + + x 1 x 2. x n 8 (4) 3 4 2

This class will demonstrate the use of bijections to solve certain combinatorial problems simply and effectively.

Can You Hear Me Now?

Part V. Chapter 19. Congruence of integers

Sierpinski's Triangle and the Prouhet-Thue-Morse Word DAVID CALLAN. Department of Statistics University Ave. November 18, 2006.

International Mathematical Forum, Vol. 6, 2011, no. 4, Manjusri Basu

Numbers and their divisors

A lattice path approach to countingpartitions with minimum rank t

Solutions for Chapter Solutions for Chapter 17. Section 17.1 Exercises

CSE 20 DISCRETE MATH. Winter

APPENDIX A. Background Mathematics. A.1 Linear Algebra. Vector algebra. Let x denote the n-dimensional column vector with components x 1 x 2.

ELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes

A Short Overview of Orthogonal Arrays

Running Modulus Recursions

Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography

Data Mining and Analysis: Fundamental Concepts and Algorithms

Inverses. Stephen Boyd. EE103 Stanford University. October 28, 2017

The Array Structure of Modified Jacobi Sequences

Affine designs and linear orthogonal arrays

Know the Well-ordering principle: Any set of positive integers which has at least one element contains a smallest element.

SQUARE ROOTS OF 2x2 MATRICES 1. Sam Northshield SUNY-Plattsburgh

Basic elements of number theory

Georgia Tech High School Math Competition

Basic elements of number theory

BC Exam Solutions Texas A&M High School Math Contest October 24, p(1) = b + 2 = 3 = b = 5.

Fast Polynomial Multiplication

CS1800 Discrete Structures Final Version A

Universal Juggling Cycles

Some congruences for Andrews Paule s broken 2-diamond partitions

Moments of Matching Statistics

Congruence Classes of 2-adic Valuations of Stirling Numbers of the Second Kind

MATHEMATICS. IMPORTANT FORMULAE AND CONCEPTS for. Final Revision CLASS XII CHAPTER WISE CONCEPTS, FORMULAS FOR QUICK REVISION.

Problem Set #1 solutions

RON M. ROTH * GADIEL SEROUSSI **

Vector spaces. EE 387, Notes 8, Handout #12

k, then n = p2α 1 1 pα k

ARTICLE IN PRESS Theoretical Computer Science ( )

PROBLEMS ON LINEAR ALGEBRA

Geometry. Separating Maps of the Lattice E 8 and Triangulations of the Eight-Dimensional Torus. G. Dartois and A. Grigis.

Key words. silver matrix, graph colouring, coding theory, domination in graphs, finite projective

A PERIODIC APPROACH TO PLANE PARTITION CONGRUENCES

Plotkin s Bound in Codes Equipped with the Euclidean Weight Function

Rings. EE 387, Notes 7, Handout #10

GRAY codes were found by Gray [15] and introduced

Mathematics 220 Homework 4 - Solutions. Solution: We must prove the two statements: (1) if A = B, then A B = A B, and (2) if A B = A B, then A = B.

Instructor: Bobby Kleinberg Lecture Notes, 25 April The Miller-Rabin Randomized Primality Test

Jumping Sequences. Steve Butler 1. (joint work with Ron Graham and Nan Zang) University of California Los Angelese

Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme

Low-Density Arrays of Circulant Matrices: Rank and Row-Redundancy Analysis, and Quasi-Cyclic LDPC Codes

4. Congruence Classes

Zero-sum square matrices

CONSTRUCTION OF SLICED SPACE-FILLING DESIGNS BASED ON BALANCED SLICED ORTHOGONAL ARRAYS

2016 EF Exam Texas A&M High School Students Contest Solutions October 22, 2016

1. (a) q = 4, r = 1. (b) q = 0, r = 0. (c) q = 5, r = (a) q = 9, r = 3. (b) q = 15, r = 17. (c) q = 117, r = 11.

Class Field Theory. Steven Charlton. 29th February 2012

a = mq + r where 0 r m 1.

MIT Algebraic techniques and semidefinite optimization February 16, Lecture 4

Computational Fluid Dynamics Prof. Sreenivas Jayanti Department of Computer Science and Engineering Indian Institute of Technology, Madras

Generating Functions (Revised Edition)

NOTE: You have 2 hours, please plan your time. Problems are not ordered by difficulty.

Algebraic structures I

Uniform Random Binary Floating Point Number Generation

Chapter 4 - MATRIX ALGEBRA. ... a 2j... a 2n. a i1 a i2... a ij... a in

arxiv: v5 [math.nt] 23 May 2017

13 th Annual Harvard-MIT Mathematics Tournament Saturday 20 February 2010

A Questionable Distance-Regular Graph

Min-Rank Conjecture for Log-Depth Circuits

Transcription:

Discrete Mathematics 106/107 (1992) 181-188 North-Holland 181 Binomial coefficient codes over W2) Persi Diaconis Harvard University, Cambridge, MA 02138, USA Ron Graham AT & T Bell Laboratories, Murray Hill, NJ 07974, USA Received 10 December 1991 Revised 5 February 1992 Abstract Diaconis, P. and R. Graham, Binomial coefficient codes over GF(2) Discrete Mathematics 106/107 (1992) 181-188. In this note we study codes over GF(2) which are generated for given d and r by binary vectors of the form ((y), (, ),, ({),., (* i )) (mod 2), 0 <i =Z d. We describe the weight enumerators of these codes and the numbers of codewords of weights 1 and 2. These results can be used to obtain sharp bounds on the rates of convergence to uniformity for certain random walks on the n-cube GF(2). 1. Introduction For fixed r 3 0 and 2 - <d s 2, let k=o will denote the weight enumerator of?& (for general coding theory references, see [3]). We call the Ce, binomial coefficient codes for the obvious reason. Correspondence to: R.L. Graham, Research, Information Sciences Division, AT&T Bell Laboratories, Room 2c-380, 600 Mountain Avenue, Murray Hill, NY 07974, USA. 0012-365X/92/$05.00 @ 1992 - Elsevier Science Publishers B.V. All rights reserved

182 P. Diaconis, R. Graham As will be explained in Section 3, knowledge of the weight structure of Y& can be used to derive rather tight bounds on convergence rates of certain random walks of the n-cube. Our objective of this paper will be to point out several facts concerning D,(t). 2. The main results Theorem 1. The weight enumerators D,(t) recurrences : are determined by the following DI(t) = 1 + t, (1) D&(t) = D,,,(t)*, m 2 1, (2) &m+&) - &m(f) = (&,+r(f) - DA)), m#2, (3) D,*+*(t) = (1+ t2) + (2t). (4) Proof. We first note the following modular relations between binomial coefficients, all of which follow from the fact (e.g., see [l]) that the power of 2 which divides ( a 1; ) is just the number of carries occurring in the base 2 addition of a and b. (mod2), (2 z1)=(i) (mod2), = 0 (mod 2), (zz:)-(i> (mod2). The proofs of (2), (3) and (4) are recursive. To form the basic recursion, let V be the d by 2 array formed by taking Wi as its ith row, 0 6 i < d. Let V, and VI be d by 2 - arrays formed from the even and odd columns of V, respectively. It follows from (5) and the definition of V that V, and VI have the following form (where all quantities are considered modulo 2): (0) (i)... (L)... (y-1) v,: 0 0... 0... 0 (p) (f) *-* (i> * - (y-y. I) 0... 0... 0

Binomial coefficient codes over GF(2) 183 (3 (3... (i)... ( -f-l) (i) 6)... (L)... (y-1) The exact form of the last rows of V, and VI will depend on the parity of d and will determine the differences between parts (2) (3) and (4) of Theorem 1. Proof of (2). Here, d = 2m. The last row of V is W,_, and the last rows of V, and VI are (mod2): The code C, is formed by taking sums of all possible subsets of rows of V. For the rows W, and W,,, there are four possibilities: take neither, take Wzi alone, take Wzi+l alone, and take both. Consider the effect of these choices on the corresponding pairs of rows in V, and VI. In the first case (neither), (00. - 10) is added to both V, and VI, In the second case (W, alone), ((y)( 3). - - (i). * - ( -:- )) is added to both V, and VI. In the third case (W,,, alone), (00 - - - 0) is added to V, and ((9) -.. ( -:- )) is add e d to V,. Finally, in the last case (both), this has the effect of adding ((7) - - * ( -:- )) to V, and (00 - - - 0) to VI. Thus, the four possibilities of adding or not adding the row ((7).. - ( -:-I)) to V, and V, each occur exactly once. Of course, this holds in general for each of the m = d/2 pairs of rows in V. Hence, in generating V 2m we are actually generating %& independently in both V, and VI. This immediately implies D%(t) = D,(t), which is (2).

184 P. Diaconk, R. Graham Proof of (3). Here, d = 2m + 1 with m f2. The last three rows of V, and V, are (mod 2): (, I)(, I).-*(,i,)... (2;l-;) K: (, -1) (,11)-Of (,i,).-.(2;:-;) (i)... y-;-y 0 (2 **- In this case, each of V, and VI have a single repeated unpaired row. In each of V, and VI the codes generated by the first 2m rows are %,,, as before. The last row is what changes %$,,, (and so, D,,(t)) into %L,,+r (and so, L&,+,(t)). Thus, &a+&) = %iz(o + (Rn+&) - Mt))2 which is (3). Proof of (4). In this case added has the form (mod 2): w2s= (29) z 0 0 (is) d = 2 + 1. In going from 2 to 2s+, the new row... (,I) (;;)... (2;)... 0 1... 1 by (5). The lengths of the words jump from 2 to 2 +. Thus, the array V appears as with all vectors having length 2. Hence, a word consisting of any linear combination of the first 2 rows has the form (2, 2) where 2 E Yze,,, therefore, the code generated by the first 2 rows has weight enumerator &(t2). Adding the final row gives words of the form (Z, Z) where Z is coordinate-wise complement of Z. Any such word has weight 2, and there are IV&( = 2 such words. Since all

Binomial coefficient codes over GF(2) 185 the rows of V are linearly independent then &(t) = (1 + t). Thus, z&+,(t) = (1 + t*)* + 22st25 which implies (4). Cl It follows from Theorem 1 that N,, = 1 for all d, and N = 2 if d = 2, 1 0 otherwise. In our next result, we describe the set S, of words in (e, of weight 2. By Theorem 1, if d = 2 then S, consists of all possible words of weight 2 and length 2, so that IS,] = ( ;). Theorem 2. Suppose 2 - < d < 2 and that the binary expansion of d begins with s ones. Then the words in S, can be described as follows. Partition the 2 coordinates into 2 disjoint blocks each of length 2 -. Each word W in S, can be uniquely specified by selecting two of the 2 blocks and an integer k, 0 < k < 2 -. W then has a one in the kth position of each of the two selected blocks and zeros everywhere else. In particular, I&l = (2;)2 -. Proof. Let us analyze the structure of the array V = V(d) formed from the rows %,w,,..., W,_,. Write r = s + t so that d begins with s ones, then a zero, then t - 1 following binary digits. In particular, The array V can be pictured as shown in Fig. 1. The lower line L which defines the lower boundary of the array is above row W2 - +...+* +* -. Hence, any subset sum of rows between L and L = 2 - + 2 -* + ~~~+2 hastheformoo~~ * OXX with X of length 2 - having even weight. Now note the following: (i) The codes generated by the rows above L are exactly the codes %2,_2, (using ideas from the proof of Theorem 1 (2)). These are exactly the codes with the following property: for every k = 0, 1,..., 2-1, the sum of the entries in positions congruent to k (mod2 ) is even; (ii) The nonzero codes generated by rows below L lie in the last block of positions and have at least four ones in each word. Theorem 2 now follows at once from these remarks. 0 3. Applications We give a brief sketch of the problem which motivated our investigations Full details can be found in [l]. here.

186 P. Diaconis, R. Graham *r-l 1 *, )I1 1 ) 0 I.,, 1...., O(),...,.,.,...,,.,.,...,...,.. ] ) 0 *..,..,...,...Y., * * ) I., 1 l, 9 1.... 0 zr-2 0 )() 1 0,... =#k 1. o. ].. 0 I.., I I -.. / 2 L > L.. : 10 0...,.,.,... y. 0,...y..,...:...,..,...: y-1 2 - Fig. 1.

Binomial coefficient codes over GF(2) 187 We consider the random walk X,, = AX,_, + E, with Xi E GF(2)d, A a fixed nonsingular lower triangular d by d matrix over GF(2), and E,, a random vector of disturbance terms. More specifically, take A to have ones on or just below the diagonal (and zero elsewhere), and the E, are independent and identically distributed vectors having common distribution Pr(e, = 0} = 1-0, P(E = e,) = 8 with O-C 0 < 1 and e, the vector with a single one in the first coordinate elsewhere. Then and zeros lim Pr(X, = y) = 1/2d n-m for any y E GF(2)d. If U(y) = 1/2d denotes the uniform distribution and Q,,(y) = Pr{X = y} then the total variation distance between Q, and lj is given by A typical question in random walks is the estimation of the number of steps needed to force l/q, - U]I to be close to 0 (so that X, is close to being random). By employing techniques from Fourier analysis, it can be shown (see [l]) that [IQ, - U/l can be expressed in terms of the weight enumerator Dd of the code %& More precisely, if 2 - < d s 2 and n = m * 2 then This explains our motivation for needing to know the structure of the very low weight words in % d. We conclude with a sharp bound obtained by this method in the particularly simple case that d = 2. (6) Theorem 3 [l]. With d = 2 and we have where d(log d + c) n = 2(log (1-264 ( I/Q,, - U]l = 1-2@( - Se- b(n/d)) <p(x) : = & I :_ e- * * dt + O(d-h), and b(nfd) is the bounded oscillating function given by b(nld) = (1-28)- @yl - 4{n/d}e(l - e))l with {x} denoting the fractional part of x.

188 P. Diaconis, R. Graham 4. Concluding remarks The reason we restricted d to satisfy 2 - < d s 2 is that for d s T-l, the rows of length 2 are just repetitions of rows from shorter codes. We have not investigated the structure of words of %& of weight 3 (or more). We also have not looked at the behavior of %d as a code. Finally, the same questions could be asked over GF(p) for a prime p, or even over ZlnZ for general rr. References [l] P. Diaconis and R.L. Graham, An affine walk on the hypercube, to appear. [2] D.E. Knuth, The Art of Computer Programming, Vol. 1 (Addison-Wesley, Menlo Park, 2nd ed., 1973). [3] J.H. van Lint, Introduction to Coding Theory (Springer, Berlin, 1982).