On the least covering radius of the binary linear codes of dimension 6 Tsonka Baicheva and Iliya Bouyukliev Institute of Mathematics and Informatics, Bulgaria.

Slides:



Advertisements
Similar presentations
Efficient classification for metric data Lee-Ad GottliebWeizmann Institute Aryeh KontorovichBen Gurion U. Robert KrauthgamerWeizmann Institute TexPoint.
Advertisements

INTRODUCTION  The problem of classification of optimal ternary constant-weight codes (TCW) is considered  We use combinatorial and computer methods.
Probabilistic verification Mario Szegedy, Rutgers www/cs.rutgers.edu/~szegedy/07540 Lecture 4.
Bounds on Code Length Theorem: Let l ∗ 1, l ∗ 2,..., l ∗ m be optimal codeword lengths for a source distribution p and a D-ary alphabet, and let L ∗ be.
Introduction to Algorithms
II. Linear Block Codes. © Tallal Elshabrawy 2 Last Lecture H Matrix and Calculation of d min Error Detection Capability Error Correction Capability Error.
Information Theory Introduction to Channel Coding Jalal Al Roumy.
2-dimensional indexing structure
CSCE 669 Project Presentation (Paper Reading) Student Presenter: Praveen Tiwari Original Author: Noga Alon, Tel Aviv University Publication: FOCS '10 Proceedings.
By : L. Pour Mohammad Bagher Author : Vladimir N. Vapnik
Probabilistic Methods in Coding Theory: Asymmetric Covering Codes Joshua N. Cooper UCSD Dept. of Mathematics Robert B. Ellis Texas A&M Dept. of Mathematics.
Reduced Support Vector Machine
Theta Function Lecture 24: Apr 18. Error Detection Code Given a noisy channel, and a finite alphabet V, and certain pairs that can be confounded, the.
Clustering In Large Graphs And Matrices Petros Drineas, Alan Frieze, Ravi Kannan, Santosh Vempala, V. Vinay Presented by Eric Anderson.
Bioinformatics Challenge  Learning in very high dimensions with very few samples  Acute leukemia dataset: 7129 # of gene vs. 72 samples  Colon cancer.
R-Trees 2-dimensional indexing structure. R-trees 2-dimensional version of the B-tree: B-tree of maximum degree 8; degree between 3 and 8 Internal nodes.
15-853Page :Algorithms in the Real World Error Correcting Codes I – Overview – Hamming Codes – Linear Codes.
Subspaces, Basis, Dimension, Rank
Mathematics1 Mathematics 1 Applied Informatics Štefan BEREŽNÝ.
Hamming Codes 11/17/04. History In the late 1940’s Richard Hamming recognized that the further evolution of computers required greater reliability, in.
Linear codes 1 CHAPTER 2: Linear codes ABSTRACT Most of the important codes are special types of so-called linear codes. Linear codes are of importance.
Support Vector Machines
Syndrome Decoding of Linear Block Code
Analysis of Iterative Decoding
Some optimization problems in Coding theory S. M. Dodunekov Institute of Mathematics and Informatics, Bulgarian Academy of Sciences 8 “G. Bonchev” Str.,
The Hat Game 11/19/04 James Fiedler. References Hendrik W. Lenstra, Jr. and Gadiel Seroussi, On Hats and Other Covers, preprint, 2002,
Linear Codes.
DIGITAL COMMUNICATION Error - Correction A.J. Han Vinck.
On comparison of different approaches to the stability radius calculation Olga Karelkina Department of Mathematics University of Turku MCDM 2011.
1 By: MOSES CHARIKAR, CHANDRA CHEKURI, TOMAS FEDER, AND RAJEEV MOTWANI Presented By: Sarah Hegab.
1 (Chapter 15): Concatenated codes Simple (classical, single-level) concatenation Length of concatenated code: n 1 n 2 Dimension of concatenated code:
Uncorrectable Errors of Weight Half the Minimum Distance for Binary Linear Codes Kenji Yasunaga * Toru Fujiwara + * Kwansei Gakuin University, Japan +
The Selection Problem. 2 Median and Order Statistics In this section, we will study algorithms for finding the i th smallest element in a set of n elements.
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
Codes Codes are used for the following purposes: - to detect errors - to correct errors after detection Error Control Coding © Erhan A. Ince Types: -Linear.
INTRODUCTION  New tools in computer package for coding theory research and studying QPlus are presented  QPlus includes a DLL library package that implements.
§6 Linear Codes § 6.1 Classification of error control system § 6.2 Channel coding conception § 6.3 The generator and parity-check matrices § 6.5 Hamming.
DIGITAL COMMUNICATIONS Linear Block Codes
Hamming codes. Golay codes.
Linear codes of good error control performance Tsonka Baicheva Institute of Mathematics and Informatics Bulgarian Academy of Sciences Bulgaria.
Probabilistic verification Mario Szegedy, Rutgers www/cs.rutgers.edu/~szegedy/07540 Lecture 5.
Similarity Searching in High Dimensions via Hashing Paper by: Aristides Gionis, Poitr Indyk, Rajeev Motwani.
Chapter 31 INTRODUCTION TO ALGEBRAIC CODING THEORY.
Information Theory Linear Block Codes Jalal Al Roumy.
TSP – Upper Bounds and Lower Bounds Initial problem : Upper Bound A salesman based in Stockton needs to visit shops based in Darlington, Billingham, Middlesbrough,
Analysis of Algorithms CS 477/677 Instructor: Monica Nicolescu Lecture 7.
The parity bits of linear block codes are linear combination of the message. Therefore, we can represent the encoder by a linear system described by matrices.
Perfect and Related Codes
Some Computation Problems in Coding Theory
Error Detection and Correction
1 What happens to the location estimator if we minimize with a power other that 2? Robert J. Blodgett Statistic Seminar - March 13, 2008.
1 MAC 2103 Module 11 lnner Product Spaces II. 2 Rev.F09 Learning Objectives Upon completing this module, you should be able to: 1. Construct an orthonormal.
Information and Coding Theory Linear Block Codes. Basic definitions and some examples. Some bounds on code parameters. Hemming and Golay codes. Syndrome.
Error Control Coding. Purpose To detect and correct error(s) that is introduced during transmission of digital signal.
RS – Reed Solomon Error correcting code. Error-correcting codes are clever ways of representing data so that one can recover the original information.
Hamming codes. Golay codes.
Kenji Yasunaga Toru Fujiwara Osaka University, Japan
The Viterbi Decoding Algorithm
15-853:Algorithms in the Real World
Singular Value Decomposition
II. Linear Block Codes.
Triangle Inequalities
RS – Reed Solomon List Decoding.
Construction of a Self-Dual [94,47,16] Code
ICS 252 Introduction to Computer Design
Vector Spaces, Subspaces
The Selection Problem.
Lecture 11 The Noiseless Coding Theorem (Section 3.4)
Lecture 15 The Minimum Distance of a Code (Section 4.4)
Kenji Yasunaga Toru Fujiwara Osaka University
Presentation transcript:

On the least covering radius of the binary linear codes of dimension 6 Tsonka Baicheva and Iliya Bouyukliev Institute of Mathematics and Informatics, Bulgaria

Basic definitions  Linear code C is a k-dimensional subspace of F q n  [n,k,d] q linear code with length n, dimension k, minimum distance d, over F q.  x+C={x+c | c ∈ C} a coset of the code C determined by the vector x ∈ F q n.  Coset leader a vector with the smallest weight in the coset.

Basic definitions  R(C) Covering radius of a code. The largest weight in the set of coset leaders. [n,k,d]R or [n,k]R  t q [n,k] Least value of R(C) when C runs over the class of all linear [n,k] codes over F q for given q.

Norm of the code  C 0 (i) the set of codewords in which i-th coordinate is 0  C 1 (i) the set of codewords in which i-th coordinate is 1  Norm of C with respect to the i-th coordinate  C has norm N if N min ≤ N

Basic definitions  C is normal if it has norm 2R+1  If N (i) ≤ 2R+1 then the i-th coordinate is acceptable with respect to 2R+1 Theorem If C is an [n,k,d] code with n≤15, k≤5 or n-k≤9, then C is normal.

ADS construction I A I B 0 0 [n A,k A ]R A I A [n B,k B ]R B I B. A⊕BA⊕B = {(a,0,b)|(a,0) ∈ A, (0,b) ∈ B} ∪ {(a,1,b)|(a,1) ∈ A, (1,b) ∈ B} [n A +n B -1,k A +k B -1]R R ≤ R A +R B

t 2 [n,k], k≤5 Cohen, Karpovsky, Mattson, Jr., Schatz ’85 Graham and Sloane ’85

t 2 [n,6] n t 2 [n,6] n t 2 [n,6] n t 2 [n,6] n t 2 [n,6] n t 2 [n,6] n t 2 [n,6]

t 2 [n,6] Graham and Sloane ‘85

t 2 [22,6]=6-7  If [22,6] code C contains a repeated coordinate R(C)≥t 2 [20,6]+1=7 ⇒ If a [22,6] code has covering radius 6 it must be a projective one.  Bouyukliev ‘2006 Classification of all binary projective codes of dimension up to 6.  There are [22,6] nonequavalent projective codes.

A heuristic algorithm for lower bound on the covering radius of a linear code  Idea of the algorithm. As fast as possible to find a coset leader of weight greater than R. Randomly chosen vector c from K c ={c+C} N(c) set of neighbors of c which differ from c in one coordinate Evaluation function f=wt(K c )2 k -A(K c ) wt(K c ) weight of the coset K c A(K c ) number of vectors of minimum weight in K c Add some noise to c

t 2 [n,6]  We show the nonexistence of projective codes of dimension 6 and even lengths 22 ≤ n ≤ 54  t 2 [22,6]=6-7 t 2 [22,6]=7  t 2 [24,6]=7-8 t 2 [24,6]=8  t 2 [25,6]=7-8  t 2 [25,6]≥t 2 [24,6] t 2 [25,6]=8

t 2 [56,6]=23-24  If [56,6] code C contains a repeated coordinate R(C) ≥ t 2 [54,6]+1=23+1=24  Otherwise, C is a shortened version of the [63,6] Simplex code with covering radius 31 and R(C) ≥ 31-7=24 ⇒ t 2 [56,6]=24 and t 2 [57,6]=24  For n≥64 every [n,6] code must contain repeated coordinate and t 2 [n,6] ≥ t 2 [n-2,6]+1 ⇒ t 2 [n,6] ≥ |̱ (n-8)/2̱| for all n≥18

t 2 [n,6]=|̱ (n-8)/2̱| for all n≥18 n t 2 [n,6] n t 2 [n,6] n t 2 [n,6] n t 2 [n,6] n t 2 [n,6] n t 2 [n,6]

Construction of codes of R=t 2 [n,6] Theorem 20, Graham and Sloane ’85 If C is an [n,k]R normal code, there are [n+2i,k]R+i normal codes for all i≥0.. A⊕BA⊕B … … A B

Construction of codes of R=t 2 [n,6]  There are 6 [7,6]1; 16 [8,6]1; 4 [9,6]1; 255 [10,6]2; 100 [11,6]2; 4126 [12,6]3; 2101 [13,6]3; 1 [14,6]3; [15,6]4 normal codes.  The [19,6,7]5 normal code constructed by Graham and Sloane is unique.  Thre are 22 [16,6]4; [17,6]5; 139 [18,6]5; 1195 [20,6]6; 3 [21,6]6; 6627 [22,6]7 projective codes.

Upper bounds for t 2 [n,8] and t 2 [n,9] DS of two [9,4]2 normal codes gives an [18,8]4 normal code and [18+2i,8]4+i normal codes exists. DS of [8,4]2 and [9,4]2 normal codes gives an [17,8]4 normal code and [17+2i,8]4+i normal codes exists. t 2 [16,8]=3.  ADS of [7,4]1 and [14,6]3 normal codes gives an [20,9]4 normal code and [20+2i,9]4+i normal codes exists. ADS of [7,4]1 and [19,6]5 normal codes gives an [25,9]6 normal code and [25+2i,9]6+i normal codes exists.

Upper bounds for t 2 [n,8] and t 2 [n,9] Theorem 4