Fundamentals of Error-Correcting Codes W
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
IEEE Information Theory Society Newsletter
IEEE Information Theory Society Newsletter Vol. 70, No. 2, June 2020 EDITOR: Salim El Rouayheb ISSN 1059-2362 President’s Column Aylin Yener The last time I wrote to you was in a differ- to ensure timely publication of outstanding ent lifetime. In the past three months, we papers that show the impact of information have witnessed a pandemic with devastating theoretic thinking in fields such as learning, impact that had cost lives and disrupted life quantum, security and others. I hope that you as we know it, in every way we can imagine. will find this new member benefit a valuable The pandemic is still far from under control in resource for your research and professional much of the world, and we do not have a date development. that we can expect to have some normalcy; of course everyone is hoping for sooner than We are now preparing to launch our new later. I still feel like I entered the twilight zone, magazine IEEE BITS. Like JSAIT, this new but have reluctantly accepted that this is not publication is also several years in the making a bad dream as I originally thought, but is the with diligent efforts of the magazine commit- new normal (at least for sometime). In dif- tee under the leadership of Christina Fragou- ficult times like these, humanity is often at its li. The magazine will start publishing in 2021 best (of course there are always exceptions); under the leadership of Rob Calderbank. We one quickly converges to what really matters thank Prof. Fragouli and the committee for in life and all of a sudden set backs that seemed monumen- spearheading this effort and Prof. -
Symbol Index
Cambridge University Press 978-0-521-13170-4 - Fundamentals of Error-Correcting Codes W. Cary Huffman and Vera Pless Index More information Symbol index ⊥,5,275 Aq (n, d,w), 60 n ⊥H ,7 A (F), 517 , 165 Aut(P, B), 292 , 533 Bi (C), 75 a , p , 219 B(n d), 48 (g(x)), 125 Bq (n, d), 48 g(x) , 125, 481 B(G), 564 x, y ,7 B(t, m), 439 x, y T , 383 C1 ⊕ C2,18 αq (δ), 89, 541 C1 C2, 368 Aut(C), 26, 384 Ci /C j , 353 AutPr(C), 28 Ci ⊥C j , 353 (L, G), 521 C∗,13 μ, 187 C| , 116 Fq (n, k), 567 Cc, 145 (q), 426 C,14 2, 423 C(L), 565 ⊥ 24, 429 C ,5,469 ∗ ⊥ , 424 C H ,7 C ⊥ ( ), 427 C T , 384 C 4( ), 503 Cq (A), 308 x, y ( ), 196 Cs , 114, 122 λ i , 293 CT ,14 λ j i , 295 CT ,16 λ i (x), 609 C(X , P, D), 535 μ a , 138 d2m , 367 ν C ( ), 465 d free, 563 ν P ( ), 584 dr (C), 283 ν s , s ( i j ), 584 Dq (A), 309 π (n) C, i (x), 608, 610 d( x), 65 ρ(C), 50, 432 d(x, y), 7 , ρBCH(t, m), 440 dE (x y), 470 , ρRM(r, m), 437 dH (x y), 470 , σp, 111 dL (x y), 470 σ (x), 181 deg f (x), 101 σ (μ)(x), 187 det , 423 Dext φs , 164 , 249 φs : Fq [I] → I, 164 e7, 367 ω(x), 190 e8, 367 A , 309 E8, 428 T A ,4 Eb, 577 E Ai (C), 8, 252 n, 209 A(n, d), 48 Es , 573 Aq (n, d), 48 evP , 534 © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-0-521-13170-4 - Fundamentals of Error-Correcting Codes W. -
Editorial Philippe Gaborit Jon-Lark Kim
Int. J. Information and Coding Theory, Vol. 1, No. 3, 2010 245 Editorial Philippe Gaborit XLIM-DMI, University of Limoges, 123, Avenue Albert Thomas, 87000 Limoges, France E-mail: [email protected] Jon-Lark Kim* Department of Mathematics, University of Louisville, 328 Natural Sciences Building, Louisville, KY 40292, USA E-mail: [email protected] *Corresponding guest editor Patrick Solé Telecom ParisTech, Dept COMELEC, 46, rue Barrault, 75013 Paris, France E-mail: [email protected] Isaac Woungang Department of Computer Science, Ryerson University, Toronto, Ontario M5B 2K3, Canada E-mail: [email protected] Biographical notes: Philippe Gaborit received a PhD from the University of Bordeaux in 1997. After a two years post-doc with Vera Pless in Chicago, he became an Associate Professor at the University of Limoges in 1999 and a Professor in 2008. His main research interests are cryptography, coding theory and security. Jon-Lark Kim received his BS in Mathematics from POSTECH, Pohang, Korea, in 1993, an MS in Mathematics from Seoul National University, Korea, in 1997 and a PhD in Mathematics from the University of Illinois at Chicago, in 2002 under the guidance of Prof. Vera Pless. From 2002 to 2005, he was with the Department of Mathematics at the University of Nebraska – Lincoln as a Research Assistant Professor. Since 2005, he has been an Assistant Professor in the Department of Mathematics at the University of Louisville, Louisville, KY. He was awarded a 2004 Kirkman Medal of the Institute of Combinatorics Copyright © 2010 Inderscience Enterprises Ltd. 246 P. Gaborit et al. and its Applications. -
Scribe Notes
6.440 Essential Coding Theory Feb 19, 2008 Lecture 4 Lecturer: Madhu Sudan Scribe: Ning Xie Today we are going to discuss limitations of codes. More specifically, we will see rate upper bounds of codes, including Singleton bound, Hamming bound, Plotkin bound, Elias bound and Johnson bound. 1 Review of last lecture n k Let C Σ be an error correcting code. We say C is an (n, k, d)q code if Σ = q, C q and ∆(C) d, ⊆ | | | | ≥ ≥ where ∆(C) denotes the minimum distance of C. We write C as [n, k, d]q code if furthermore the code is a F k linear subspace over q (i.e., C is a linear code). Define the rate of code C as R := n and relative distance d as δ := n . Usually we fix q and study the asymptotic behaviors of R and δ as n . Recall last time we gave an existence result, namely the Gilbert-Varshamov(GV)→ ∞ bound constructed by greedy codes (Varshamov bound corresponds to greedy linear codes). For q = 2, GV bound gives codes with k n log2 Vol(n, d 2). Asymptotically this shows the existence of codes with R 1 H(δ), which is similar≥ to− Shannon’s result.− Today we are going to see some upper bound results, that≥ is,− code beyond certain bounds does not exist. 2 Singleton bound Theorem 1 (Singleton bound) For any code with any alphabet size q, R + δ 1. ≤ Proof Let C Σn be a code with C Σ k. The main idea is to project the code C on to the first k 1 ⊆ | | ≥ | | n k−1 − coordinates. -
Optimal Codes and Entropy Extractors
Department of Mathematics Ph.D. Programme in Mathematics XXIX cycle Optimal Codes and Entropy Extractors Alessio Meneghetti 2017 University of Trento Ph.D. Programme in Mathematics Doctoral thesis in Mathematics OPTIMAL CODES AND ENTROPY EXTRACTORS Alessio Meneghetti Advisor: Prof. Massimiliano Sala Head of the School: Prof. Valter Moretti Academic years: 2013{2016 XXIX cycle { January 2017 Acknowledgements I thank Dr. Eleonora Guerrini, whose Ph.D. Thesis inspired me and whose help was crucial for my research on Coding Theory. I also thank Dr. Alessandro Tomasi, without whose cooperation this work on Entropy Extraction would not have come in the present form. Finally, I sincerely thank Prof. Massimiliano Sala for his guidance and useful advice over the past few years. This research was funded by the Autonomous Province of Trento, Call \Grandi Progetti 2012", project On silicon quantum optics for quantum computing and secure communications - SiQuro. i Contents List of Figures......................v List of Tables....................... vii Introduction1 I Codes and Random Number Generation7 1 Introduction to Coding Theory9 1.1 Definition of systematic codes.............. 16 1.2 Puncturing, shortening and extending......... 18 2 Bounds on code parameters 27 2.1 Sphere packing bound.................. 29 2.2 Gilbert bound....................... 29 2.3 Varshamov bound.................... 30 2.4 Singleton bound..................... 31 2.5 Griesmer bound...................... 33 2.6 Plotkin bound....................... 34 2.7 Johnson bounds...................... 36 2.8 Elias bound........................ 40 2.9 Zinoviev-Litsyn-Laihonen bound............ 42 2.10 Bellini-Guerrini-Sala bounds............... 43 iii 3 Hadamard Matrices and Codes 49 3.1 Hadamard matrices.................... 50 3.2 Hadamard codes..................... 53 4 Introduction to Random Number Generation 59 4.1 Entropy extractors................... -
Program of the Sessions – Columbus, OH, Friday, September 21 (Cont’D.)
Program of the Sessions Columbus, Ohio, September 21–23, 2001 2:00PM New lower bounds on the maximum number of Friday, September 21 (6) mutually orthogonal Steiner triple systems. Preliminary report. Meeting Registration Jeff Dinitz*, University of Vermont, and Peter Dukes, Calif. Institute of Technology (969-05-233) 12:30 PM –4:30PM MW 154, Mathematics Tower (MW) 2:30PM On abelian relative difference sets which are (7) extensions of diffrence sets with classical AMS Exhibit and Book Sale parameters. Preliminary report. Nobuo Nobu Nakagawa, Naka, Department of 12:30 PM –4:30PM MW 724, Mathematics Tower (MW) Mathematics Faculty of Science and Technology (969-05-66) Special Session on Algebraic Cycles, Algebraic 3:00PM Higher Weights and Nonbinary Self-Dual Codes. Geometry, I (8) Steven T Dougherty, University of Scranton, and Aaron Gulliver*, University of Victoria (969-94-220) 1:30 PM –5:15PM UH 0151, UniversityHall (UH) 3:30PM A technique for constructing non-embeddable (9) quasi-residual designs. Organizer: RoyJoshua , Ohio State University YuryJ. Ionin *andKirsten Mackenzie-Fleming, 1:30PM Equivariant Todd Classes for Toric Varieties. Central Michigan University (969-05-246) (1) Jean-Luc Brylinski, Penn State University, and Bin 4:00PM An Existence Theorem for Group Divisible 2-Designs Zhang*, SUNY at Stony Brook (969-14-131) (10) of Large Order. 2:30PM Combinatorics of the Toric Hilbert Scheme. Hedvig Mohacsy*andDijen K Ray-Chaudhuri,The (2) Rekha R Thomas*, University of washington, and Ohio State University (969-05-250) , Institute for Advanced Study Diane Maclagan 4:30PM Extremal problems under dimension constraints. (969-05-185) (11) Preliminary report. -
Editorial Philippe Gaborit Jon-Lark Kim* Patrick Solé Isaac Woungang
Int. J. Information and Coding Theory, Vol. 1, No. 2, 2010 129 Editorial Philippe Gaborit XLIM-DMI, University of Limoges, 123, Avenue Albert Thomas, 87000 Limoges, France E-mail: [email protected] Jon-Lark Kim* Department of Mathematics, University of Louisville, 328 Natural Sciences Building, Louisville, KY 40292, USA E-mail: [email protected] *Corresponding guest editor Patrick Solé Telecom ParisTech, Dept COMELEC, 46, rue Barrault, 75013 Paris, France E-mail: [email protected] Isaac Woungang Department of Computer Science, Ryerson University, Toronto, Ontario M5B 2K3, Canada E-mail: [email protected] Biographical notes: Philippe Gaborit received a PhD from the University of Bordeaux in 1997. After a two years post-doc with Vera Pless in Chicago, he became an Associate Professor at the University of Limoges in 1999 and a Professor in 2008. His main research interests are cryptography, coding theory and security. Jon-Lark Kim received his BS in Mathematics from POSTECH, Pohang, Korea, in 1993, an MS in Mathematics from Seoul National University, Korea, in 1997 and a PhD in Mathematics from the University of Illinois at Chicago, in 2002 under the guidance of Prof. Vera Pless. From 2002 to 2005, he was with the Department of Mathematics at the University of Nebraska – Lincoln as a Research Assistant Professor. Since 2005, he has been an Assistant Professor in the Department of Mathematics at the University of Louisville, Louisville, KY. He was awarded a 2004 Kirkman Medal of the Institute of Combinatorics Copyright © 2010 Inderscience Enterprises Ltd. 130 P. Gaborit et al. and its Applications. -
Weighted Generating Functions and Configuration Results for Type II
Weighted Generating Functions and Configuration Results for Type II Lattices and Codes An honors thesis presented by Scott Duke Kominers to The Department of Mathematics in partial fulfillment of the requirements for the degree of Bachelor of Arts with Honors in the subject of Mathematics Harvard University Cambridge, Massachusetts March 2009 Thesis Advisor: Professor Noam D. Elkies Abstract We present an exposition of weighted theta functions, which are weighted generating functions for the norms and distribution of lattice vectors. We derive a decomposition theorem for the space of degree-d homogeneous polynomials in terms of spaces of harmonic polynomials and then prove that the weighted theta functions of Type II lattices are examples of modular forms. Our development of these results is structural, related to the infinite-dimensional representation theory of the Lie algebra sl2. We give several applications of weighted theta functions: a condition on the root systems of Type II lattices of rank 24; a proof that extremal Type II lattices yield spherical t-designs; and configuration results for extremal Type II lattices of ranks 8, 24, 32, 40, 48, 56, 72, 80, 96, and 120, one of which has not appeared previously. Then, we give a new structural development of harmonic weight enumerators—the coding- theoretic analogs of weighted theta functions—in analogy with our approach to weighted theta functions. We use the finite-dimensional representation theory of sl2 to derive a decomposition the- orem for the space of degree-d discrete homogeneous polynomials in terms of the spaces of discrete harmonic polynomials and then prove a generalized MacWilliams identity for harmonic weight enu- merators. -
Finite Fields and Their Applications
FINITE FIELDS AND THEIR APPLICATIONS AUTHOR INFORMATION PACK TABLE OF CONTENTS XXX . • Description p.1 • Audience p.1 • Impact Factor p.1 • Abstracting and Indexing p.2 • Editorial Board p.2 • Guide for Authors p.4 ISSN: 1071-5797 DESCRIPTION . Finite Fields and Their Applications is a peer-reviewed technical journal publishing papers in finite field theory as well as in applications of finite fields. As a result of applications in a wide variety of areas, finite fields are increasingly important in several areas of mathematics, including linear and abstract algebra, number theory and algebraic geometry, as well as in computer science, statistics, information theory, and engineering. For cohesion, and because so many applications rely on various theoretical properties of finite fields, it is essential that there be a core of high-quality papers on theoretical aspects. In addition, since much of the vitality of the area comes from computational problems, the journal publishes papers on computational aspects of finite fields as well as on algorithms and complexity of finite field- related methods. The journal also publishes papers in various applications including, but not limited to, algebraic coding theory, cryptology, combinatorial design theory, pseudorandom number generation, and linear recurring sequences. There are other areas of application to be included, but the important point is that finite fields play a nontrivial role in the theory, application, or algorithm. Finite Fields and Their Applications is published four times per year and maintains very strict refereeing standards, accepting only those papers which receive excellent referee reports.This journal has an Open Archive. All published items, including research articles, have unrestricted access and will remain permanently free to read and download 48 months after publication. -
Editorial Philippe Gaborit Jon-Lark Kim
Int. J. Information and Coding Theory, Vol. 1, No. 4, 2010 351 Editorial Philippe Gaborit XLIM-DMI, University of Limoges, 123 av. Albert Thomas, 87000 Limoges, France E-mail: [email protected] Jon-Lark Kim* Department of Mathematics, University of Louisville, 328 Natural Sciences Building, Louisville, KY 40292, USA E-mail: [email protected] *Corresponding guest editor Patrick Solé Telecom ParisTech, Department of Comelec, 46 rue Barrault, 75013 Paris, France E-mail: [email protected] Isaac Woungang Department of Computer Science, Ryerson University, Toronto, Ontario M5B 2K3, Canada E-mail: [email protected] Biographical notes: Philippe Gaborit received a PhD at the University of Bordeaux in 1997. After a two years post-doc with Vera Pless in Chicago, he became an Associate Professor at the University of Limoges in 1999, and a Professor in 2008. His main research interests are cryptography, coding theory and security. Jon-Lark Kim received the BS in Mathematics from POSTECH, Pohang, Korea, in 1993, the MS in Mathematics from Seoul National University, Korea, in 1997, and the PhD in Mathematics from the University of Illinois at Chicago, in 2002 under the guidance of Prof. Vera Pless. From 2002 to 2005, he was with the Department of Mathematics at the University of Nebraska- Lincoln as a Research Assistant Professor. Since 2005, he has been an Assistant Professor in the Department of Mathematics at the University of Louisville, Louisville, KY. He was awarded a 2004 Kirkman Medal of the Institute of Copyright © 2010 Inderscience Enterprises Ltd. 352 P. Gaborit et al. Combinatorics and its Applications. -
Study of Some Bounds on Binary Codes
5 X October 2017 http://doi.org/10.22214/ijraset.2017.10004 International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor:6.887 Volume 5 Issue X, October 2017- Available at www.ijraset.com Study of Some Bounds on Binary Codes Rajiv Jain1, Jaskarn Singh Bhullar2 1,2Department of Applied Sciences, MIMIT, Malout Punjab Abstract: In this paper, various bounds on maximum number of codeword’s for a given size and minimum distance is discussed. Then these bounds are studied with example and various types of upper bounds are calculated for size and distance. The comparison of these bounds have been done and the tighter bounds for (,) is discussed. Keywords: Error Correction, Binary Codes, Bounds, Hamming Bound, Plot kin Bound, Elias Bound I. INTRODUCTION For a given q-ary (n, M, d) error correcting code, n is the size of code, d is the minimum distance between codewords of the code and M is the maximum number of codewords in the code. The efficiency of error correcting code is measured by number of codewords M in the code and the d is the error correcting capability of the code[1, 5]. It is necessary to have maximum number of codewords M in code with minimum distance d as high as possible for a good error correcting code. But in practice, for a code of given size n and minimum distance d, it is not always possible to obtain large M. So for given n, one has to negotiate between number of codewords M and Minimum distance d. -
Super-Visible Codes
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector Discrete Mathematics 110 (1992) 119-134 119 North-Holland Super-visible codes J. Francke and J.J.H. Meijers Department of Mathematics and Computing Science, Eindhouen University of Technology, Eindhoven, Netherlands Received 14 August 1990 Abstract Francke, J. and J.J.H. Meijers, Super-visible codes, Discrete Mathematics 110 (1992) 119-134. Upper bounds and constructions are given for super-visible codes. These are linear codes with the property that all words of minimum weight form a basis of the code. Optimal super-visible codes are summarized for small lengths and minimum distances. 1. Introduction It is well know that the weight of a nonzero codeword in any Reed-Muller code is at least equal to the weight of the lowest-weight row of the standard generator matrix for that code. This recently led Ward [8] to study general linear codes with the same property, i.e. codes for which there exists a generator matrix G such that no nonzero codeword has smaller weight than the lowest-weight row of G. He called such codes visible. In a similar vein is the remarkable fact that the rows of the incidence matrix of a projective plane of order n =2 (mod4) generate a code of dimension $(n’+ it + 2) in which the plane is still ‘visible’ as the collection of minimum- weight codewords [l]. In general we can consider binary codes for which the words of minimum weight contain a basis of the code.