Error Correcting Codes

Total Page:16

File Type:pdf, Size:1020Kb

Error Correcting Codes ERROR CORRECTING CODES THESIS Presented in Partial Fulfillment of the Requirements for the Degree Masters of Science in the Graduate School of the Ohio State University By Peter M. Kosek, B.S. in Mathematics Graduate Program in Mathematics The Ohio State University 2014 Thesis Committee: Matthew Kahle, Advisor David Sivakoff c Copyright by Peter M. Kosek 2014 ABSTRACT Error correcting codes is an area of mathematics that combines many theoretical concepts with a wide variety of applications. In this expository thesis, we will begin by introducing many of the fundamental ideas in classical error correcting codes. The goal of this is to introduce the reader to the field of coding theory and discuss a few of the wide range of classical codes that have been studied. The second section will discuss the recent findings in error correcting codes, namely their use in quantum error correcting codes. This section uses much more theoretical areas of math, when compared to the classical section, in the construction of quantum error correcting codes. Most of the research discussed in this section has been completed within the past six years. All of the research discoveries presented in this thesis have been previously known. ii ACKNOWLEDGMENTS I would like to thank Matthew Kahle for his willingness to serve as my advisor. He has challenged me to learn topics I never imagined I would understand. I have appreciated his feedback on my writings. I would also like to thank David Sivakoff for being willing to be a member of my committee. I would very much like to thank the both of these gentlemen and their wives for meeting last minute to allow me to defend my thesis by the deadline. A very big thank you goes out to my wife, Amy, for her hugs and encouragement throughout this entire process. I have benefitted greatly from her encouragements to be diligent in writing and to not procrastinate. I would also like to thank Howard Skogman for initially introducing me to the area of error correcting codes and for making the topic come alive and create a desire to learn more about the subject. iii VITA 2008 . B.S. in Mathematics, The College at Brockport, State Univer- sity of New York 2012-Present . Graduate University Fellowship, The Ohio State University 2013-Present . Graduate Teaching Associate, The Ohio State University PUBLICATIONS Firke, Frank; Kosek, Peter; Nash, Evan; Williford, Jason Extremal Graphs Without 4-Cycles FIELDS OF STUDY Major Field: Mathematics iv TABLE OF CONTENTS Abstract . ii Acknowledgments . iii Vita......................................... iv List of Figures . vi CHAPTER PAGE 1 Classical Error Correcting Codes . .1 1.1 Motivation . .1 1.2 Minimum Distance Decoding . .4 1.2.1 t-error-correcting and t-error-detecting codes . .7 1.3 The Main Coding Theory Problem . .9 1.3.1 Bounds for Aq(n; d)......................9 1.4 Linear codes . 13 1.4.1 Syndrome decoding . 15 1.5 Other examples of codes . 18 1.5.1 Hamming codes . 18 1.5.2 Non-linear codes . 21 2 Quantum Error Correcting Codes . 23 2.1 Motivation . 23 2.2 Calderbank{Shor{Steane codes . 24 2.3 Recent research . 26 2.4 Quantum LDPC codes based on homological properties . 27 2.5 Quantum LDPC codes based on Cayley graphs . 29 Bibliography . 33 v LIST OF FIGURES FIGURE PAGE 1.1 Fano plane . 21 vi CHAPTER 1 CLASSICAL ERROR CORRECTING CODES 1.1 Motivation Let's begin by creating a simple scenario. Suppose you are in communication with another person at a distance using some noisy binary channel (i.e. a method of sending 0's and 1's in which errors may occur in which 0 gets switched to 1 and vice versa). Assume that the chance of an error occurring for any bit is less likely than the correct bit being received and that the likelihood of an error is independent of any other error occurring. Furthermore, assume the only two phrases you would like to send to one another are `yes' and `no'. You have both decided that 0 represents no and 1 represents yes. One day, you send the message 1, but due to the noise in the channel, the other person receives 0. Since the chance of an error occurring is less likely than the correct word being sent, the other person assumes that you said no. Clearly, this is not good. After learning your lesson, you realize that maybe you should not have the oc- currence of one error result in another word. You both decide that from now on, 00 represents no and 11 represents yes. That way, it would take two errors occurring to end up with the completely wrong word, and that has even less chance of occurring than a single error occurring. Now, if either one of you receive 01 or 10, you know that an error has occurred! However, you don't know if they meant to send 00 or 11. 1 This is not an issue if you are able to ask for the message to be resent. But if the message is not easily resent, then all you know if that an error has occurred and you have a 50/50 chance of guessing what the correct message was. You decide that it would be best if you could allow the other person, with a relatively high certainty, to know what the original message was, even if a single error occurred. You both decide that from now on, 000 represents no and 111 represents yes. Now, suppose you send 111 to the other person and an error has occurred and they receive 011. The other person realizes that an error has occurred since 011 is not a word you both agreed on. However, he knows that the chance of two errors occurring (if you had sent 000 and the last two bits got flipped) is much less than a single error occurring. Therefore, with a fair amount of certainity, he can assume you sent 111, which is correct! You can keep adding more bits of redundancy to your codewords to allow the detection of more errors as well as the correction of more errors. However, you'll end up with more data that needs to be transferred, which takes a longer amount of time. Also, you realize that you're only sending two words. What if you wanted to be able to send more than just yes and no? Error correcting codes are used when one is attempting to transmit messages across a noisy communication channel. For example, they are used in CD's to allow it to play music even if there are scratches, as well as in the transmission of pictures taken from outer space. The process is as follows. A certain message would like to be sent to some user. The message is encoded in some way by adding redundancy to the message to create a codeword. (As a side note, all parties have complete knowledge of the encoding.) Then, this codeword is transmitted through a noisy channel. Errors may or may not occur at this stage. A word is then received by the user. Using some 2 decoding method, the user will decode the word to be some message (it may or may not be correct). Definition 1.1.1. Let A = fa1; a2; : : : ; aqg be a finite set, called a code alphabet. Any codeword sent or received will be strings formed using elements from the code alphabet. We call a code over an alphabet of size q a q-ary code. Most often, the code alphabets we use are f0; 1; 2; : : : ; q−1g. However, there are other interesting examples using other code alphabets. Example 1.1.2. We could consider all street names in Columbus, OH as a 37-ary code (26 letters, 10 digits, and a space). We see that this is an example of a very poor code since EAST 4TH AVENUE and EAST 5TH AVENUE only differ in one location, so if an error occurred in that location, we would not know that our received street name was correct. Example 1.1.3. The ISBN numbers in every book are examples of error correcting codes. Older books have a 10-digit ISBN number while newer books have a 13-digit ISBN number. The ISBN-10 code has codewords of the form (x1; x2; : : : ; x10) where x1 + 2x2 + 3x3 + ··· + 9x9 + 10x10 ≡ 0 mod 11 with x1; x2; : : : ; x9 2 f0; 1;:::; 9g and x10 2 f0; 1;:::; 9;Xg. Since x10 is the check digit, if the previous numbers require x10 = 10, it is denoted as an X. The ISBN-13 code had codewords of the form (x1; x2; : : : ; x13) where x1 + 3x2 + x3 + 3x4 + x5 + 3x6 ··· + 3x12 + x13 ≡ 0 mod 10 with x1; x2; : : : ; x13 2 f0; 1;::: 9g. In both of these codes, every two codewords differ in at least two locations. Example 1.1.4. The United States Postal Service used to use a code called POST- NET (Postal Numeric Encoding Technique) to assist in the correct sending and re- ceiving of mail [8]. It used a series of tall and short bars to encode information about 3 the letter being sent. The first five digits are your zip code, the next four digits are the extended zip code, the next two digits are the delivery point digits and the last digit is a check digit to ensure that the sum of all of the digits is congruent to 0 mod 10. The digits were encoded into bars by the following table: number bar code 1 j j j 2 j j j 3 j j j 4 j j j 5 j j j 6 j j j 7 j j j 8 j j j 9 j j j 0 j j j Suppose the Postal Service receives a letter in which the first five bars got smudged and are unreadable.
Recommended publications
  • Scribe Notes
    6.440 Essential Coding Theory Feb 19, 2008 Lecture 4 Lecturer: Madhu Sudan Scribe: Ning Xie Today we are going to discuss limitations of codes. More specifically, we will see rate upper bounds of codes, including Singleton bound, Hamming bound, Plotkin bound, Elias bound and Johnson bound. 1 Review of last lecture n k Let C Σ be an error correcting code. We say C is an (n, k, d)q code if Σ = q, C q and ∆(C) d, ⊆ | | | | ≥ ≥ where ∆(C) denotes the minimum distance of C. We write C as [n, k, d]q code if furthermore the code is a F k linear subspace over q (i.e., C is a linear code). Define the rate of code C as R := n and relative distance d as δ := n . Usually we fix q and study the asymptotic behaviors of R and δ as n . Recall last time we gave an existence result, namely the Gilbert-Varshamov(GV)→ ∞ bound constructed by greedy codes (Varshamov bound corresponds to greedy linear codes). For q = 2, GV bound gives codes with k n log2 Vol(n, d 2). Asymptotically this shows the existence of codes with R 1 H(δ), which is similar≥ to− Shannon’s result.− Today we are going to see some upper bound results, that≥ is,− code beyond certain bounds does not exist. 2 Singleton bound Theorem 1 (Singleton bound) For any code with any alphabet size q, R + δ 1. ≤ Proof Let C Σn be a code with C Σ k. The main idea is to project the code C on to the first k 1 ⊆ | | ≥ | | n k−1 − coordinates.
    [Show full text]
  • An Introduction to Coding Theory
    An introduction to coding theory Adrish Banerjee Department of Electrical Engineering Indian Institute of Technology Kanpur Kanpur, Uttar Pradesh India Feb. 6, 2017 Lecture #7A: Bounds on the size of a code Adrish Banerjee Department of Electrical Engineering Indian Institute of Technology Kanpur Kanpur, Uttar Pradesh India An introduction to coding theory Outline of the lecture Hamming bound Adrish Banerjee Department of Electrical Engineering Indian Institute of Technology Kanpur Kanpur, Uttar Pradesh India An introduction to coding theory Outline of the lecture Hamming bound Perfect codes Adrish Banerjee Department of Electrical Engineering Indian Institute of Technology Kanpur Kanpur, Uttar Pradesh India An introduction to coding theory Outline of the lecture Hamming bound Perfect codes Singleton bound Adrish Banerjee Department of Electrical Engineering Indian Institute of Technology Kanpur Kanpur, Uttar Pradesh India An introduction to coding theory Outline of the lecture Hamming bound Perfect codes Singleton bound Maximum distance separable codes Adrish Banerjee Department of Electrical Engineering Indian Institute of Technology Kanpur Kanpur, Uttar Pradesh India An introduction to coding theory Outline of the lecture Hamming bound Perfect codes Singleton bound Maximum distance separable codes Plotkin Bound Adrish Banerjee Department of Electrical Engineering Indian Institute of Technology Kanpur Kanpur, Uttar Pradesh India An introduction to coding theory Outline of the lecture Hamming bound Perfect codes Singleton bound Maximum distance separable codes Plotkin Bound Gilbert-Varshamov bound Adrish Banerjee Department of Electrical Engineering Indian Institute of Technology Kanpur Kanpur, Uttar Pradesh India An introduction to coding theory Bounds on the size of a code The basic problem is to find the largest code of a given length, n and minimum distance, d.
    [Show full text]
  • Algebraic Geometric Codes: Basic Notions Mathematical Surveys and Monographs
    http://dx.doi.org/10.1090/surv/139 Algebraic Geometric Codes: Basic Notions Mathematical Surveys and Monographs Volume 139 Algebraic Geometric Codes: Basic Notions Michael Tsfasman Serge Vladut Dmitry Nogin American Mathematical Society EDITORIAL COMMITTEE Jerry L. Bona Peter S. Landweber Michael G. Eastwood Michael P. Loss J. T. Stafford, Chair Our research while working on this book was supported by the French National Scien­ tific Research Center (CNRS), in particular by the Inst it ut de Mathematiques de Luminy and the French-Russian Poncelet Laboratory, by the Institute for Information Transmis­ sion Problems, and by the Independent University of Moscow. It was also supported in part by the Russian Foundation for Basic Research, projects 99-01-01204, 02-01-01041, and 02-01-22005, and by the program Jumelage en Mathematiques. 2000 Mathematics Subject Classification. Primary 14Hxx, 94Bxx, 14G15, 11R58; Secondary 11T23, 11T71. For additional information and updates on this book, visit www.ams.org/bookpages/surv-139 Library of Congress Cataloging-in-Publication Data Tsfasman, M. A. (Michael A.), 1954- Algebraic geometry codes : basic notions / Michael Tsfasman, Serge Vladut, Dmitry Nogin. p. cm. — (Mathematical surveys and monographs, ISSN 0076-5376 ; v. 139) Includes bibliographical references and index. ISBN 978-0-8218-4306-2 (alk. paper) 1. Coding theory. 2. Number theory. 3. Geometry, Algebraic. I. Vladut, S. G. (Serge G.), 1954- II. Nogin, Dmitry, 1966- III. Title. QA268 .T754 2007 003'.54—dc22 2007061731 Copying and reprinting. Individual readers of this publication, and nonprofit libraries acting for them, are permitted to make fair use of the material, such as to copy a chapter for use in teaching or research.
    [Show full text]
  • ELEC 619A Selected Topics in Digital Communications: Information Theory
    ELEC 519A Selected Topics in Digital Communications: Information Theory Hamming Codes and Bounds on Codes Single Error Correcting Codes 2 Hamming Codes • (7,4,3) Hamming code 1 0 0 0 0 1 1 0 1 0 0 1 0 1 GIP | 0 0 1 0 1 1 0 0 0 0 1 1 1 1 • (7,3,4) dual code 0 1 1 1 1 0 0 T HPI -| 1011010 1 1 0 1 0 0 1 3 • The minimum distance of a code C is equal to the minimum number of columns of H which sum to zero • For any codeword c h0 h T 1 cH [c,c,...,c01 n1 ] ch 0011 ch ...c n1n1 h 0 hn1 where ho, h1, …, hn-1 are the column vectors of H T • cH is a linear combination of the columns of H 4 Significance of H • For a codeword of weight w (w ones), cHT is a linear combination of w columns of H. • Thus there is a one-to-one mapping between weight w codewords and linear combinations of w columns of H that sum to 0. • The minimum value of w which results in cHT=0, i.e., codeword c with weight w, determines that dmin = w 5 Distance 1 and 2 Codes • (5,2,1) code 10100 10110 HG= 10010 = 01000 00001 • (5,2,2) codes 11100 10110 HG= 11010 = 01110 00001 6 (7,4,3) Code • A codeword with weight dmin = 3 is given by the first row of G: c = 1000011 • The linear combination of the first and last 2 columns in H gives T T T T (011) +(010) +(001) = (000) • Thus a minimum of 3 columns (= dmin) are required to get a zero value for cHT 7 Binary Hamming Codes Let m be an integer and H be an m (2m - 1) matrix with columns which are the non-zero distinct elements from Vm.
    [Show full text]
  • Generalized Sphere-Packing and Sphere-Covering Bounds on the Size
    1 Generalized sphere-packing and sphere-covering bounds on the size of codes for combinatorial channels Daniel Cullina, Student Member, IEEE and Negar Kiyavash, Senior Member, IEEE Abstract—Many of the classic problems of coding theory described. Erasure and deletion errors differ from substitution are highly symmetric, which makes it easy to derive sphere- errors in a more fundamental way: the error operation takes packing upper bounds and sphere-covering lower bounds on the an input from one set and produces an output from another. size of codes. We discuss the generalizations of sphere-packing and sphere-covering bounds to arbitrary error models. These In this paper, we will discuss the generalizations of sphere- generalizations become especially important when the sizes of the packing and sphere-covering bounds to arbitrary error models. error spheres are nonuniform. The best possible sphere-packing These generalizations become especially important when the and sphere-covering bounds are solutions to linear programs. sizes of the error spheres are nonuniform. Sphere-packing and We derive a series of bounds from approximations to packing sphere-covering bounds are fundamentally related to linear and covering problems and study the relationships and trade-offs between them. We compare sphere-covering lower bounds with programming and the best possible versions of the bounds other graph theoretic lower bounds such as Turan’s´ theorem. We are solutions to linear programs. In highly symmetric cases, show how to obtain upper bounds by optimizing across a family of including many classical error models, it is often possible to channels that admit the same codes.
    [Show full text]
  • Classification of Perfect Codes and Minimal Distances in the Lee Metric
    Master Thesis Classification of perfect codes and minimal distances in the Lee metric Naveed Ahmed 1982-06-20 Waqas Ahmed 1982-09-13 Subject: Mathematics Level: Advance Course code: 5MA12E Abstract Perfect codes and minimal distance of a code have great importance in the study of theory of codes. The perfect codes are classified generally and in particular for the Lee met- ric. However, there are very few perfect codes in the Lee metric. The Lee metric has nice properties because of its definition over the ring of integers residue modulo q.Itis conjectured that there are no perfect codes in this metric for q > 3, where q is a prime number. The minimal distance comes into play when it comes to detection and correction of error patterns in a code. A few bounds on the number of codewords and minimal distance of a code are discussed. Some examples for the codes are constructed and their minimal distance is calculated. The bounds are illustrated with the help of the results obtained. Key-words: Hamming metric; Lee metric; Perfect codes; Minimal distance iii Acknowledgments This thesis is written as a part of the Degree of Master of Science in Mathematics at Linnaeus University, Sweden. It is written at the School of Computer Science, Physics and Mathematics. We would like to thank our supervisor Per-Anders Svensson who has been very sup- porting throughout the whole period. We are also obliged to him for giving us chance to work under his supervision. We would also like to thank our Program Manager Marcus Nilsson who has been very helpful and very cooperative within all matters, and also all the respectable faculty members of the department.
    [Show full text]
  • MAS309 Coding Theory
    MAS309 Coding theory Matthew Fayers January–March 2008 This is a set of notes which is supposed to augment your own notes for the Coding Theory course. They were written by Matthew Fayers, and very lightly edited my me, Mark Jerrum, for 2008. I am very grateful to Matthew Fayers for permission to use this excellent material. If you find any mistakes, please e-mail me: [email protected]. Thanks to the following people who have already sent corrections: Nilmini Herath, Julian Wiseman, Dilara Azizova. Contents 1 Introduction and definitions 2 1.1 Alphabets and codes . 2 1.2 Error detection and correction . 2 1.3 Equivalent codes . 4 2 Good codes 6 2.1 The main coding theory problem . 6 2.2 Spheres and the Hamming bound . 8 2.3 The Singleton bound . 9 2.4 Another bound . 10 2.5 The Plotkin bound . 11 3 Error probabilities and nearest-neighbour decoding 13 3.1 Noisy channels and decoding processes . 13 3.2 Rates of transmission and Shannon’s Theorem . 15 4 Linear codes 15 4.1 Revision of linear algebra . 16 4.2 Finite fields and linear codes . 18 4.3 The minimum distance of a linear code . 19 4.4 Bases and generator matrices . 20 4.5 Equivalence of linear codes . 21 4.6 Decoding with a linear code . 27 5 Dual codes and parity-check matrices 30 5.1 The dual code . 30 5.2 Syndrome decoding . 34 1 2 Coding Theory 6 Some examples of linear codes 36 6.1 Hamming codes . 37 6.2 Existence of codes and linear independence .
    [Show full text]
  • Math 550 Coding and Cryptography Workbook J. Swarts 0121709 Ii Contents
    Math 550 Coding and Cryptography Workbook J. Swarts 0121709 ii Contents 1 Introduction and Basic Ideas 3 1.1 Introduction . 3 1.2 Terminology . 4 1.3 Basic Assumptions About the Channel . 5 2 Detecting and Correcting Errors 7 3 Linear Codes 13 3.1 Introduction . 13 3.2 The Generator and Parity Check Matrices . 16 3.3 Cosets . 20 3.3.1 Maximum Likelihood Decoding (MLD) of Linear Codes . 21 4 Bounds for Codes 25 5 Hamming Codes 31 5.1 Introduction . 31 5.2 Extended Codes . 33 6 Golay Codes 37 6.1 The Extended Golay Code : C24. ....................... 37 6.2 The Golay Code : C23.............................. 40 7 Reed-Muller Codes 43 7.1 The Reed-Muller Codes RM(1, m) ...................... 46 8 Decimal Codes 49 8.1 The ISBN Code . 49 8.2 A Single Error Correcting Decimal Code . 51 8.3 A Double Error Correcting Decimal Code . 53 iii iv CONTENTS 8.4 The Universal Product Code (UPC) . 56 8.5 US Money Order . 57 8.6 US Postal Code . 58 9 Hadamard Codes 61 9.1 Background . 61 9.2 Definition of the Codes . 66 9.3 How good are the Hadamard Codes ? . 67 10 Introduction to Cryptography 71 10.1 Basic Definitions . 71 10.2 Affine Cipher . 73 10.2.1 Cryptanalysis of the Affine Cipher . 74 10.3 Some Other Ciphers . 76 10.3.1 The Vigen`ereCipher . 76 10.3.2 Cryptanalysis of the Vigen`ereCipher : The Kasiski Examination . 77 10.3.3 The Vernam Cipher . 79 11 Public Key Cryptography 81 11.1 The Rivest-Shamir-Adleman (RSA) Cryptosystem .
    [Show full text]
  • Linear Programming Bounds for Tree Codes (Corresp.)
    Linear Programming Bounds Peter Boyvalenkov [email protected] Institute for Mathematics and Informatics, Bulgarian Academy of Sciences, Sofia, Bulgaria; Technical Faculty, Southwestern University, Blagoevgrad, Bulgaria Danyo Danev [email protected] Department of Electrical Engineering and Department of Mathematics, Link¨oping University, SE-581 83 Link¨oping, Sweden Abstract This chapter is written for the forthcoming book ”A Concise Encyclopedia of Coding The- ory” (CRC press), edited by W. Cary Huffman, Jon-Lark Kim, and Patrick Sol´e. This book will collect short but foundational articles, emphasizing definitions, examples, exhaustive refer- ences, and basic facts. The target audience of the Encyclopedia is upper level undergraduates and graduate students. 1 Preliminaries – Krawtchouk polynomials, codes, and designs Definition 1.1 (Krawtchouk polynomials). Let n 1 and q 2 be integers. The Krawtchouk ≥ ≥ polynomials are defined as i (n,q) j i j j n j z K (z) := ( 1) (q 1) − q − , i = 0, 1, 2,..., i − − n i j Xj=0 − where z := z(z 1) (z j + 1)/j!, z R. j − · · · − ∈ (n,q) Theorem 1.2 ([57]). The polynomials Ki (z) satisfy the three-term recurrence relation (n,q) (n,q) (n,q) arXiv:1903.02255v1 [cs.IT] 6 Mar 2019 (i + 1)Ki+1 (z) = [i + (q 1)(n i) qz]Ki (z) (q 1)(n i + 1)Ki 1 (z) − − − − − − − with initial conditions K(n,q)(z) = 1 and K(n,q)(z)= n(q 1) qz. 0 1 − − Theorem 1.3 ([57]). The discrete measure n n n i dµ (t) := q− (q 1) δ(t i)dt, (1) n i − − Xi=0 where δ(i) is the Dirac-delta measure at i 0, 1,...,n , and the form ∈ { } f, g = f(t)g(t)dµ (t) (2) h i n Z define an inner product over the class of real polynomials of degree less than or equal to n.
    [Show full text]
  • Bounds on Error-Correction Coding Performance
    Chapter 1 Bounds on Error-Correction Coding Performance 1.1 Gallager’s Coding Theorem The sphere packing bound by Shannon [18] provides a lower bound to the frame error rate (FER) achievable by an (n, k, d) code but is not directly applicable to binary codes. Gallager [4] presented his coding theorem for the average FER for the ensemble of all random binary (n, k, d) codes. There are 2n possible binary combinations for each codeword which in terms of the n-dimensional signal space hypercube corresponds to one vertex taken from 2n possible vertices. There are 2k codewords, and therefore 2nk different possible random codes. The receiver is considered to be composed of 2k matched filters, one for each codeword and a decoder error occurs if any of the matched filter receivers has a larger output than the matched filter receiver corresponding to the transmitted codeword. Consider this matched filter receiver and another different matched filter receiver, and assume that the two codewords differ in d bit positions. The Hamming distance between the two = k codewords is d. The energy per transmitted bit is Es n Eb, where Eb is the energy σ 2 = N0 per information bit. The noise variance per matched filtered received bit, 2 , where N0 is the single sided noise spectral density. In the absence√ of noise, the output of the matched filter receiver for the transmitted codeword√ is n Es and the output of the other codeword matched filter receiver is (n − 2d) Es . The noise voltage at the output of the matched filter receiver for the transmitted codeword is denoted as nc − n1, and the noise voltage at the output of the other matched filter receiver will be nc + n1.
    [Show full text]
  • Genetic Algorithms in Coding Theory : a Table for $A 3(N,D)$
    Genetic algorithms in coding theory : a table for $A_3(n,d)$ Citation for published version (APA): Vaessens, R. J. M., Aarts, E. H. L., & van Lint, J. H. (1991). Genetic algorithms in coding theory : a table for $A_3(n,d)$. (Memorandum COSOR; Vol. 9122). Technische Universiteit Eindhoven. Document status and date: Published: 01/01/1991 Document Version: Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication: • A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal.
    [Show full text]
  • 5 Bounds in Coding Theory
    5 Bounds in coding theory Given a q-ary (n, M, d)-code, where n is fixed, the size M is a measure of the efficiency of the code, and the distance d is an indication of its error-correcting capability. It would be nice if both M and d could be as large as possible, but, as we shall see shortly in this chapter, this is not quite possible, and a compromise needs to be struck. For given q, n and d, we shall discuss some well known upper and lower bounds for the largest possible value of M. In the case where M is actually equal to one of the well known bounds, interesting codes such as perfect codes and MDS codes are obtained. We also discuss certain properties and examples of some of these fascinating families. 5.1 The main coding theory problem Let C be a q-ary code with parameters (n, M, d). Recall from Chapter 2 that the R = / information rate (or transmission rate) of C is defined to be (C) (logq M) n. We also introduce here the notion of the relative minimum distance. Definition 5.1.1 For a q-ary code C with parameters (n, M, d), the relative minimum distance of C is defined to be δ(C) = (d − 1)/n. Remark 5.1.2 The relative minimum distance of C is often defined to be d/n in the literature, but defining it as (d −1)/n leads sometimes to neater formulas (see Remark 5.4.4). = n Example 5.1.3 (i) Consider the q-ary code C Fq .
    [Show full text]