INTRODUCTION  The problem of classification of optimal ternary constant-weight codes (TCW) is considered  We use combinatorial and computer methods.

Slides:



Advertisements
Similar presentations
Problems and Their Classes
Advertisements

Gillat Kol joint work with Ran Raz Locally Testable Codes Analogues to the Unique Games Conjecture Do Not Exist.
Introduction to Computer Science 2 Lecture 7: Extended binary trees
Error Control Code.
1 Combinational Logic Design&Analysis. 2 Introduction We have learned all the prerequisite material: – Truth tables and Boolean expressions describe functions.
Bounds on Code Length Theorem: Let l ∗ 1, l ∗ 2,..., l ∗ m be optimal codeword lengths for a source distribution p and a D-ary alphabet, and let L ∗ be.
GOLOMB RULERS AND GRACEFUL GRAPHS
Information Theory Introduction to Channel Coding Jalal Al Roumy.
Gillat Kol joint work with Ran Raz Locally Testable Codes Analogues to the Unique Games Conjecture Do Not Exist.
CS774. Markov Random Field : Theory and Application Lecture 06 Kyomin Jung KAIST Sep
Complexity 16-1 Complexity Andrei Bulatov Non-Approximability.
Correcting Errors Beyond the Guruswami-Sudan Radius Farzad Parvaresh & Alexander Vardy Presented by Efrat Bank.
Probabilistic Methods in Coding Theory: Asymmetric Covering Codes Joshua N. Cooper UCSD Dept. of Mathematics Robert B. Ellis Texas A&M Dept. of Mathematics.
Definitions Let i) standard q-ary alphabet. iii) is a set of n elements ii) is the set of all q! permutations of q symbols. n-sequence q-partition.
Vladimir V. Ufimtsev Adviser: Dr. V. Rykov A Mathematical Theory of Communication C.E. Shannon Main result: Entropy function - average value of information.
Theta Function Lecture 24: Apr 18. Error Detection Code Given a noisy channel, and a finite alphabet V, and certain pairs that can be confounded, the.
Ger man Aerospace Center Gothenburg, April, 2007 Coding Schemes for Crisscross Error Patterns Simon Plass, Gerd Richter, and A.J. Han Vinck.
Hamming Codes 11/17/04. History In the late 1940’s Richard Hamming recognized that the further evolution of computers required greater reliability, in.
Some optimization problems in Coding theory S. M. Dodunekov Institute of Mathematics and Informatics, Bulgarian Academy of Sciences 8 “G. Bonchev” Str.,
On comparison of different approaches to the stability radius calculation Olga Karelkina Department of Mathematics University of Turku MCDM 2011.
CS774. Markov Random Field : Theory and Application Lecture 08 Kyomin Jung KAIST Sep
SPANISH CRYPTOGRAPHY DAYS (SCD 2011) A Search Algorithm Based on Syndrome Computation to Get Efficient Shortened Cyclic Codes Correcting either Random.
Combinatorial Algorithms Reference Text: Kreher and Stinson.
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
ON UNICYCLIC REFLEXIVE GRAPHS. The spectrum of a simple graph (non-oriented, without loops and multiple edges) is the spectrum of its adjacency matrix,
Logic Circuits Chapter 2. Overview  Many important functions computed with straight-line programs No loops nor branches Conveniently described with circuits.
On the least covering radius of the binary linear codes of dimension 6 Tsonka Baicheva and Iliya Bouyukliev Institute of Mathematics and Informatics, Bulgaria.
Uncorrectable Errors of Weight Half the Minimum Distance for Binary Linear Codes Kenji Yasunaga * Toru Fujiwara + * Kwansei Gakuin University, Japan +
ERROR CONTROL CODING Basic concepts Classes of codes: Block Codes
Discrete Structures Lecture 12: Trees Ji Yanyan United International College Thanks to Professor Michael Hvidsten.
Introduction to Coding Theory. p2. Outline [1] Introduction [2] Basic assumptions [3] Correcting and detecting error patterns [4] Information rate [5]
1 Yuan Luo Xi’an Jan Optimum Distance Profiles of Linear Block Codes Shanghai Jiao Tong University.
5.5.3 Rooted tree and binary tree  Definition 25: A directed graph is a directed tree if the graph is a tree in the underlying undirected graph.  Definition.
Huffman coding Content 1 Encoding and decoding messages Fixed-length coding Variable-length coding 2 Huffman coding.
INTRODUCTION  New tools in computer package for coding theory research and studying QPlus are presented  QPlus includes a DLL library package that implements.
Maximum density of copies of a graph in the n-cube John Goldwasser Ryan Hansen West Virginia University.
Hamming codes. Golay codes.
Chapter 31 INTRODUCTION TO ALGEBRAIC CODING THEORY.
Information Theory Linear Block Codes Jalal Al Roumy.
Word : Let F be a field then the expression of the form a 1, a 2, …, a n where a i  F  i is called a word of length n over the field F. We denote the.
The least known length of ordered basis of symmetric group S. A. Kalinchuk, Yu. L. Sagalovich Institute for Information Transmission Problems, Russian.
1 Triangle-free Distance-regular Graphs with Pentagons Speaker : Yeh-jong Pan Advisor : Chih-wen Weng.
The parity bits of linear block codes are linear combination of the message. Therefore, we can represent the encoder by a linear system described by matrices.
Perfect and Related Codes
Some Computation Problems in Coding Theory
1 Design of LDPC codes Codes from finite geometries Random codes: Determine the connections of the bipartite Tanner graph by using a (pseudo)random algorithm.
Foundation of Computing Systems
A multi-objective synthesis of optimal control system by the network operator method 1 A.I. Diveev Institution of Russian Academy of Sciences Dorodnicyn.
Mixed Covering Arrays on Graphs Presenter: Latifa Zekaoui Joint work with Karen Meagher and Lucia Moura to appear in the Journal of Combinatorial Designs.
Two Finger Caging of Concave Polygon Peam Pipattanasomporn Advisor: Attawith Sudsang.
Algorithms for hard problems Parameterized complexity – definitions, sample algorithms Juris Viksna, 2015.
Introduction to NP Instructor: Neelima Gupta 1.
5.6 Prefix codes and optimal tree Definition 31: Codes with this property which the bit string for a letter never occurs as the first part of the bit string.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Hamming codes. Golay codes.
IERG6120 Lecture 22 Kenneth Shum Dec 2016.
Part 2 Linear block codes
Subject Name: Information Theory Coding Subject Code: 10EC55
Intro to Theory of Computation
Computability and Complexity
Richard Anderson Lecture 25 NP-Completeness
Construction of a Self-Dual [94,47,16] Code
Block codes. encodes each message individually into a codeword n is fixed, Input/out belong to alphabet Q of cardinality q. The set of Q-ary n-tuples.
Information Redundancy Fault Tolerant Computing
Optimal Conflict-avoiding Codes of Odd Length Weight Three
Lecture 17 Making New Codes from Old Codes (Section 4.6)
Selection procedure of turbo code parameters by combinatorial optimization Yannick Saouter 24/06/2019.
Lecture 15 The Minimum Distance of a Code (Section 4.4)
Theory of Information Lecture 13
Classification of doubly resolvable designs and orthogonal resolutions
Presentation transcript:

INTRODUCTION  The problem of classification of optimal ternary constant-weight codes (TCW) is considered  We use combinatorial and computer methods to find inequivalent codes for some cases for 3 ≤ d ≤ n ≤ 9

PRELIMINARIES  Ternary (n,M,d) code - consists of M vectors of length n over alphabet {0,1,2} such that any two codewords differ in at least d positions  (n,M,d,w) constant-weight code - all the codewords have the same Hamming weight w  A 3 (n,d,w) – the largest possible value of M when the other parameters are fixed Codes with such parameters are called optimal  One of the main open problem of algebraic coding theory is enumeration (up to equivalence) of optimal codes

HISTORY  V. Zinoviev (1984) – Generalization of Johnson bound for constant- weight code  A.Brouwer, J.Shearer, N.Sloane, and W.Smith (1990) - Table of binary constant-weight codes for n ≤ 28  E.Agrell, A.Vardy, and K.Zeger (2000) – Upper Bounds, Binary codes  G.Bogdanova (2000) – New bounds, TCW codes  P.Ostergard and M.Svanstrom (2002) - Table of TCW codes  D. Smith, L.Hughes and S.Perkins (2006) - New Table of Constant Weight Codes for n ≥ 28  Y.Chee, S.Ling (2007) - Constructions for q-ary Constant-Weight Codes

PRELIMINARIES  A q (n,d,n) = A q-1 (n,d)   Johnson bounds: −

ENUMERATION OF TCW CODES  Two ternary constant-weight codes are equivalent if one of them can be obtained from the other by transformations of the following types: – permutation of the coordinates of the code; – permutation of the alphabet symbols appearing in a fixed position  Exhaustive search is not applicable for large parameters

ENUMERATION OF TCW  Maximum Clique search problem – vertex set corresponds to the words of length n and Hamming weight w – two vertices are joined by an edge if the Hamming distance between the corresponding words is greater than or equal to d  (n,M,d,w) code can be shortened to get (n - 1, M',d,w) subcode  Construct a code C - by classifying all such subcodes, and then use the clique-finding approach to find the rest of the words in C.

ENUMERATION OF TCW  Two basic steps: – Finding all inequivalent possibilities for subcode C 0 – Extending any of them to the size of C  Аlgorithms are implemented in the computer package QPlus  Some of the results are also verified using Q-Extension software

RESULTS Theorem (a) There exist unique (up to equivalence) TCW codes with parameters: (3,3,3,2), (4,4,3,2), (4,2,4,2), (4,8,3,3), (4,2,4,3), (5,5,3,2), (5,2,4,2), (5,12,3,3), (5,5,4,3), (5,2,5,3), (5,5,4,4), (5,2,5,4), (6,3,4,2), (6,4,5,3), (6,2,6,3), (6,15,4,4), (6,4,5,4), (6,3,6,4), 6,12,4,5), (6,3,5,5), (6,2,6,5), (7,3,4,2), (7,14,4,3), (7,2,6,3), (7,2,7,4), (7,2,7,5), (7,7,5,6), (7,2,6,6), (7,2,7,6), (8,4,4,2), (8,5,5,3), (8,2,6,3), (8,2,8,4), (8,2,8,5), (8,2,8,6), (8,16,5,7), (8,2,8,7), (9,4,4,2), (9,3,6,3), (9,3,7,4), (9,2,8,4), (9,5,7,5), (9,3,8,5), (9,2,9,5), (9,3,9,6), (9,3,8,7), (9,2,9,7), (9,3,7,8),(9,2,9,8)

RESULTS Let #(n,M,d,w) denote the number of inequivalent TCW codes with the specified parameters. (b) We have: #(5,10,3,4)=64, #(6,6,3,2)=2, #(6,18,3,3)=54, #(6,8,4,3)=3, #(6; 24; 3; 5) ≥ 20, #(7,7,3,2)=2, #(7,4,5,3)=2, #(7,7,5,4)=45, #(7,3,6,4)=3, #(7,3,6,5)=4, #(7,9,5,5)=2, #(7; 14; 4; 6) ≥ 74, #(8,8,3,2)=3, #(8,5,6,4)=2, #(8,2,7,4)=2, #(8,8,6,5)=5, #(8,3,7,5)=3, #(8,8,6,6)=22, #(8,3,7,6)=2, #(8,4,6,7)=2, #(8,2,7,7)=2, #(9,9,3,2)=4, #(9,6,5,3)=2, #(9,6,7,6)=12, #(9,3,8,6)=4, #(9,5,7,7)=11, #(9,2,8,8)=2

EXAMPLE Operation done in: 0:3:21 Result: Vector space: 830 Total of 7883 constant-weight codes found with parameters: (Q = 3; N = 8; M = 8; D = 6; W = 5;) 5 non equivalent codes found.

THANK YOU !