Some optimization problems in Coding theory S. M. Dodunekov Institute of Mathematics and Informatics, Bulgarian Academy of Sciences 8 “G. Bonchev” Str.,

Slides:



Advertisements
Similar presentations
INTRODUCTION  The problem of classification of optimal ternary constant-weight codes (TCW) is considered  We use combinatorial and computer methods.
Advertisements

Error Control Code.
Information and Coding Theory
Error Correcting Codes Stanley Ziewacz 22M:151 Spring 2009.
II. Linear Block Codes. © Tallal Elshabrawy 2 Last Lecture H Matrix and Calculation of d min Error Detection Capability Error Correction Capability Error.
Information Theory Introduction to Channel Coding Jalal Al Roumy.
IV054 CHAPTER 2: Linear codes ABSTRACT
Correcting Errors Beyond the Guruswami-Sudan Radius Farzad Parvaresh & Alexander Vardy Presented by Efrat Bank.
DIGITAL COMMUNICATION Coding
Probabilistic Methods in Coding Theory: Asymmetric Covering Codes Joshua N. Cooper UCSD Dept. of Mathematics Robert B. Ellis Texas A&M Dept. of Mathematics.
Chapter 11 Algebraic Coding Theory. Single Error Detection M = (1, 1, …, 1) is the m  1 parity check matrix for single error detection. If c = (0, 1,
On conflict-avoiding codes of weight 3 and odd length Kenneth Shum Oct 2011.
1 Neural Nets Applications Vectors and Matrices. 2/27 Outline 1. Definition of Vectors 2. Operations on Vectors 3. Linear Dependence of Vectors 4. Definition.
Variable-Length Codes: Huffman Codes
15-853Page :Algorithms in the Real World Error Correcting Codes I – Overview – Hamming Codes – Linear Codes.
Hamming Codes 11/17/04. History In the late 1940’s Richard Hamming recognized that the further evolution of computers required greater reliability, in.
Linear codes 1 CHAPTER 2: Linear codes ABSTRACT Most of the important codes are special types of so-called linear codes. Linear codes are of importance.
Syndrome Decoding of Linear Block Code
The Hat Game 11/19/04 James Fiedler. References Hendrik W. Lenstra, Jr. and Gadiel Seroussi, On Hats and Other Covers, preprint, 2002,
Hadamard matrices and the hadamard conjecture
DIGITAL COMMUNICATION Error - Correction A.J. Han Vinck.
Cyclic codes 1 CHAPTER 3: Cyclic and convolution codes Cyclic codes are of interest and importance because They posses rich algebraic structure that can.
SPANISH CRYPTOGRAPHY DAYS (SCD 2011) A Search Algorithm Based on Syndrome Computation to Get Efficient Shortened Cyclic Codes Correcting either Random.
Information and Coding Theory Linear Block Codes. Basic definitions and some examples. Juris Viksna, 2015.
BCH_Code 2004/5/5Yuh-Ming Huang, CSIE, NCNU1 BCH Code a larger class of powerful random error-correcting cyclic codes a remarkable generalization of the.
On the least covering radius of the binary linear codes of dimension 6 Tsonka Baicheva and Iliya Bouyukliev Institute of Mathematics and Informatics, Bulgaria.
Uncorrectable Errors of Weight Half the Minimum Distance for Binary Linear Codes Kenji Yasunaga * Toru Fujiwara + * Kwansei Gakuin University, Japan +
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
Codes Codes are used for the following purposes: - to detect errors - to correct errors after detection Error Control Coding © Erhan A. Ince Types: -Linear.
ERROR CONTROL CODING Basic concepts Classes of codes: Block Codes
MIMO continued and Error Correction Code. 2 by 2 MIMO Now consider we have two transmitting antennas and two receiving antennas. A simple scheme called.
1 Yuan Luo Xi’an Jan Optimum Distance Profiles of Linear Block Codes Shanghai Jiao Tong University.
INTRODUCTION  New tools in computer package for coding theory research and studying QPlus are presented  QPlus includes a DLL library package that implements.
§6 Linear Codes § 6.1 Classification of error control system § 6.2 Channel coding conception § 6.3 The generator and parity-check matrices § 6.5 Hamming.
Hamming codes. Golay codes.
1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 20 (2009)
Linear codes of good error control performance Tsonka Baicheva Institute of Mathematics and Informatics Bulgarian Academy of Sciences Bulgaria.
ADVANTAGE of GENERATOR MATRIX:
Chapter 31 INTRODUCTION TO ALGEBRAIC CODING THEORY.
Information and Coding Theory Cyclic codes Juris Viksna, 2015.
Information Theory Linear Block Codes Jalal Al Roumy.
Word : Let F be a field then the expression of the form a 1, a 2, …, a n where a i  F  i is called a word of length n over the field F. We denote the.
The parity bits of linear block codes are linear combination of the message. Therefore, we can represent the encoder by a linear system described by matrices.
Perfect and Related Codes
Some Computation Problems in Coding Theory
Elementary Coding Theory Including Hamming and Reed-Solomom Codes with Maple and MATLAB Richard Klima Appalachian State University Boone, North Carolina.
Computer Construction of Quasi-Twisted Two-Weight Codes Eric Chen Dept. of Comp.Science Kristianstad University Kristianstad Sweden.
1 Asymptotically good binary code with efficient encoding & Justesen code Tomer Levinboim Error Correcting Codes Seminar (2008)
Digital Communications I: Modulation and Coding Course Term Catharina Logothetis Lecture 9.
International Iran conference on Quantum Information September 2007, Kish Island Evaluation of bounds of codes defined over hexagonal and honeycomb lattices.
Stats & Summary. The Woodbury Theorem where the inverses.
Fidelity of a Quantum ARQ Protocol Alexei Ashikhmin Bell Labs  Classical Automatic Repeat Request (ARQ) Protocol  Quantum Automatic Repeat Request (ARQ)
Information and Coding Theory Linear Block Codes. Basic definitions and some examples. Some bounds on code parameters. Hemming and Golay codes. Syndrome.
Richard Cleve DC 2117 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Lecture (2011)
Reed-Solomon Codes Rong-Jaye Chen.
Block Coded Modulation Tareq Elhabbash, Yousef Yazji, Mahmoud Amassi.
ECE 442 COMMUNICATION SYSTEM DESIGN LECTURE 10. LINEAR BLOCK CODES Husheng Li Dept. of EECS The University of Tennessee.
Channel Coding: Part I Presentation II Irvanda Kurniadi V. ( ) Digital Communication 1.
Hamming codes. Golay codes.
Information and Coding Theory
Kenji Yasunaga Toru Fujiwara Osaka University, Japan
Subject Name: Information Theory Coding Subject Code: 10EC55
Algebraic Codes and Invariance
II. Linear Block Codes.
IV054 CHAPTER 2: Linear codes ABSTRACT
Block codes. encodes each message individually into a codeword n is fixed, Input/out belong to alphabet Q of cardinality q. The set of Q-ary n-tuples.
Cyclic Code.
Lecture 17 Making New Codes from Old Codes (Section 4.6)
Kenji Yasunaga Toru Fujiwara Osaka University
Mathematical Background: Extension Finite Fields
Presentation transcript:

Some optimization problems in Coding theory S. M. Dodunekov Institute of Mathematics and Informatics, Bulgarian Academy of Sciences 8 “G. Bonchev” Str., 1113 Sofia, Bulgaria

November 20, 2008, ENST, Paris2 C O N T E N T S 1. Introduction 2. Covering radius of BCH codes 3. Quasi-perfect codes 4. Singleton bound, MDS, AMDS, NMDS codes 5. Grey-Rankin bound 6. Conclusions

November 20, 2008, ENST, Paris3 1. Introduction,, q-prime power d(x, y) Hamming distance C : code d = d(C) min distance t(C) =

November 20, 2008, ENST, Paris4 ρ(C) = d(x, c) covering radius ρ(C) = t(C)  Perfect code ρ(C) = 1 + t(C) Quasi-perfect code

November 20, 2008, ENST, Paris5 If C is a k-dimensional subspace of, then C : [n, k, d] q code For linear codes d(C) = {min wt (c) I c C, c ≠ 0} ρ(C) max weight of a coset leader

November 20, 2008, ENST, Paris6 The parameters of perfect codes - the whole space - the binary repetition code - the Hamming codes (23, 2 12, 7) 2 – the binary Golay code (11, 3 6, 5) 3 – the ternary Golay code

November 20, 2008, ENST, Paris7 Classification (up to equivalence) Unique linear Hamming code Golay codes are unique Open: non-linear Hamming codes Hamming bound

November 20, 2008, ENST, Paris8 All sets of parameters for which  perfect codes are known: Van Lint Tietäväinen (1973) Zinoviev, Leontiev ( ) Natural question: ? QP codes

November 20, 2008, ENST, Paris9 2. Covering radius of BCH codes Gorenstein, Peterson, Zierler (1960) Primitive binary 2-error correcting BCH codes  QP MacWilliams, Sloane (1977): Research problem (9.4). Show that no other BCH codes are quasi-perfect

November 20, 2008, ENST, Paris10 Helleseth (1979): No primitive binary t-error-correcting BCH codes are QP when t › 2 Recall: n = 2 m – 1 Leontiev (1968): Partial result for

November 20, 2008, ENST, Paris11 Binary 3-error correcting BCH codes of length 2 m – 1, m ≥ 4 ρ = 5 History: Van der Horst, Berger (1976) Assmus, Mattson (1976) Completed by T. Helleseth (1978): m - even, m ≥ 10

November 20, 2008, ENST, Paris12 Long BCH codes min polynomial of α i, where α is of order 2 m – 1

November 20, 2008, ENST, Paris13 Helleseth (1985) C = (g(x)) i) ii) has no multiple zeros, iii)D = max If then

November 20, 2008, ENST, Paris14 Tietäväinen ( 1985) ρ(C) ≤ 2t for large enough m. For t-designed BCH codes of length g(x) = m N (x)m 3N (x)… m (2t - 1)N (x) 2t - 1 ≤ ρ ≤ 2t + 1

November 20, 2008, ENST, Paris15 3. Quasi-perfect codes Etzion, Mounits (2005, IT-51) : q = 2 q = 3 n =, k = n- 2s, d = 5, ρ = 3 Gashkov, Sidel’nikov (1986)

November 20, 2008, ENST, Paris16 n =, k = n – 2s, d = 5, ρ = 3 if s ≥ 3 - odd Danev, Dodunekov (2007)

November 20, 2008, ENST, Paris17 q = 4 Two families: n =, k = n – 2s, d = 5 Gevorkjan et al. (1975) N =, k = n – 2s, d = 5 Dumer, Zinoviev (1978)

November 20, 2008, ENST, Paris18 Both are quasi-perfect, i.e. ρ = 3 D. ( ) Open: ? QP codes for q › 4 In particular, QP codes with d = 5?

November 20, 2008, ENST, Paris19 q = 3, α – primitive n-th root of unity in an extension field of. =  α = β 2 The minimal polynomials of α and α -1 :

November 20, 2008, ENST, Paris20 C s (g(x)), g(x) = g 1 (x)g -1 (x), k = n – 2s, s ≥ 3 – odd  d = 5 ρ(C s ) = 3 C s is a BCH code! Set γ = α 2. Then = {α -3, α -1, α, α 3,}

November 20, 2008, ENST, Paris21 Hence, infinitely many counterexamples to (9.4)! C 3 : [13, 7, 5] QR code Baicheva, D., Kötter (2002) Open: i) QP BCH codes for q > 4? ii) QP BCH codes for d ≥ 7?

November 20, 2008, ENST, Paris22 Binary and ternary QP codes with small dimensions Wagner (1966, 1967) Computer search, 27 binary QP codes 19 ≤ n ≤ 55, ρ = 3 One example for each parameter set.

November 20, 2008, ENST, Paris23 Simonis (2000): the [23, 14, 5] Wagner code is unique up to equivalence. Recently: Baicheva, Bouykliev, D., Fack (2007): A systematic investigation of the possible parameters of QP binary and ternary codes

November 20, 2008, ENST, Paris24 Results Classification up to equivalence of all binary and ternary QP codes of dimensions up to 9 and 6 respectively; Partial classification for dimensions up to 14 and 13 respectively

November 20, 2008, ENST, Paris25 Important observations For many sets of parameters  more than one QP code: [19, 10, 5] 2  12 codes [20, 11, 5] 2  564 codes

November 20, 2008, ENST, Paris26 Except the extended Golay [24, 12, 8] 2 code and the [8, 1, 8] 2 repetition code we found 11 [24, 12, 7] 2 and 2 [25, 12, 8] 2 QP codes with ρ = 4 Positive answer to the first open problem of Etzion, Mounits (2005).

November 20, 2008, ENST, Paris27 4. Singleton bound, MDS, AMDS, NMDS Singleton (1964): C: [n, k, d] q code  d ≤ n – k + 1 For nonlinear codes: s = n – k + 1 Singleton defect. s = 0  MDS codes

November 20, 2008, ENST, Paris28 An old optimization problem: m(k,q) code (MDS code) Conjecture: except for m(3,q) = m(q – 1, q) = q + 2 for q =power of 2. max n:  [n, k, n - k +1] q

November 20, 2008, ENST, Paris29 s = 1  Almost MDS codes (AMDS) Parameters: [n, k, n – k] q If C is an AMDS, C ┴ is not necessarily AMDS. D., Landjev (1993): Near MDS codes. Simplest definition: d + d ┴ = n

November 20, 2008, ENST, Paris30 Some properties: 1.If n › k + q every [n, k, n – k]q code is NMDS code. 2.For an AMDS code C: [n, k, n – k]q with k ≥ 2 i) n ≤ 2q + k ; ii) C is generated by its codewords of weight n – k and n – k +1; if n › q + k, C is generated by its minimum weight vectors.

November 20, 2008, ENST, Paris31 3. C: [n, k] q – NMDS code with weight distribution {Ai, i = 0,..., n} then: 4.

November 20, 2008, ENST, Paris32 An optimization pr o blem Define m ' (k, q) = max n :  a NMDS code with parameters [n, k, n-k] q What is known? 1.m'(k, q) ≤ 2q+k. In the case of equality A n-k+1 = m'(k, q) = k + 1 for every k › 2q.

November 20, 2008, ENST, Paris33 3.  integer α, 0 ≤ α ≤ k m'(k, q) ≤ m'(k-α, q) + α 4. If q › 3, then m'(k, q) ≤ 2q + k – 2

November 20, 2008, ENST, Paris34 5. Tsfasman, Vladut (1991): NMDS AG codes for every Conjecture: m'(k, q) ≈ q + 2√q

November 20, 2008, ENST, Paris35 5. Grey – Rankin bound Grey (1956), Rankin(1962) C : (n, M, d) 2 code, (1, 1,…1) C. C self-complementary Then provided

November 20, 2008, ENST, Paris36 Constructions of codes meeting the Grey-Rankin bound Gary Mc Guire (1997) Suppose. Then A. i) n-odd;  a self-complementary code meeting the Grey-Rankin bound   a Hadamard matrix of size n + 1;

November 20, 2008, ENST, Paris37 ii) n-even;  a self-complementary code meeting the Grey-Rankin bound   a quasi- symmetric 2 – (n, d, λ) design with block intersection sizes and,

November 20, 2008, ENST, Paris38 Remark A code is said to form an orthogonal array of strength t The projection of the code on to any t coordinates contains every t-tuple the same number of times

November 20, 2008, ENST, Paris39 Equality in holds The distance between codewords in C are all in {0, d, n – d, n} and the codewords form an orthogonal array of strength 2.

November 20, 2008, ENST, Paris40 B. In the linear case i)n-odd; the parameters of C are [2 s – 1, s + 1, 2 s – 1 – 1], s ≥ 2 and the corresponding Hadamard matrix is of Sylvester type. ii)n-even; the parameters are [2 2m-1 – 2 m – 1, 2m + 1, 2 2m – 2 – 2 m – 1 ] C 1, or [2 2m m – 1, 2m + 1, 2 2m – 2 ] C 2.

November 20, 2008, ENST, Paris41 Remark Put C 1 and C 2 side by side: RM(1, 2m) = (C 1 I C 2 )  of nonequivalent codes of both types is equal. Remark  nonlinear codes meeting

November 20, 2008, ENST, Paris42 Bracken, Mc Guire, Ward (2006) u N, even i)Suppose  a 2u x 2u Hadamard matrix and u – 2 mutually orthogonal 2u x 2u Latin squares. Then there exists a quasi-symmetric 2-(2u 2 – u, u 2 – u, u 2 – u – 1) design with block intersection sizes and

November 20, 2008, ENST, Paris43 ii) Suppose  a 2u x 2u Hadamard matrix and u – 1 mutually orthogonal Latin squares. Then  a quasi-symmetric 2-(2u 2 + u, u 2, u 2 – u) design with block intersection sizes and

November 20, 2008, ENST, Paris44 The associated codes have parameters (n = 2u 2 – u, M = 8u 2, d = u 2 – u) (n = 2u 2 + u, M = 8u 2, d = u 2 ) u = 6 (n = 66, M = 288, d = 30)  Open ? 30 years Meeting

November 20, 2008, ENST, Paris45 Nonbinary version of GR-bound Fu, Kl Ø ve, Shen (1999) C: (n, M, d) q - code, for which 1)

November 20, 2008, ENST, Paris46 2)  a, b C  d (a, b) ≤ 2 dup – d. Then

November 20, 2008, ENST, Paris47 Construction of codes meeting FKS bound The general concatenation construction A: code  outer code B: code  inner code Assume: q a = M b B = {b (i), i = 0,1…, M b - 1}

November 20, 2008, ENST, Paris48 The alphabet of A: E a = {0,1,…, q a – 1} The construction:  a A,, E a C = {c(a) : a A} C : (n, M, d) q code with parameters n = n a n b, M = M a, d ≥ d a d b, q = q b

November 20, 2008, ENST, Paris49 D., Helleseth, Zinoviev (2004) Take B : q = p h, p – prime A : an MDS code with d a = n a – 1, M a = q 2m

November 20, 2008, ENST, Paris50 Take The general concatenated construction: C : (n, M, d) q with C meets the FKS bound

November 20, 2008, ENST, Paris51 Something more: 1)in terms of n:. n 1, n 2 - the roots, n 1 ‹ n 2 The construction gives codes satisfying FKS bound for  n, n 1 ‹ n ≤ n max and with equality for n = n max

November 20, 2008, ENST, Paris52 n-simplex in the n-dimensional q-ary Hamming space A set of q vectors with Hamming distance n between any two distinct vectors. an upper bound on the size of a family of binary n-simplices with pairwize distance ≥ d.

November 20, 2008, ENST, Paris53 S q (n, d) max # of n-simplices in the q-ary Hamming n-space with distance ≥ d.

November 20, 2008, ENST, Paris54 Bassalygo, D., Helleseth, Zinoviev (2006) provided that the denominator is positive. The codes meeting the bound have strength 2.

November 20, 2008, ENST, Paris55 6. Conclusions Optimality with respect to the length, distance, dimension is not a necessary condition for the existence of a QP code; The classification of all parameters for which  QP codes would be much more difficult than the similar one for perfect codes.

November 20, 2008, ENST, Paris56 Open (and more optimistic): Are there QP codes with ρ ≥ 5? Is there an upper bound on the minimum distance of QP codes?

T H A N K Y O U !