Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
AI
This paper discusses the concept of single substitution error correcting codes and their relationship to combinatorial structures. Specifically, it addresses how error spheres can be defined and utilized to create perfect error-correcting codes, partitioning the entire space of possible messages. The paper also delves into factorization within finite abelian groups, particularly emphasizing the role of cyclic subsets and their implications for periodicity in group structures.
2009 IEEE Information Theory Workshop, 2009
The Varshamov-Tenengol'ts codes are binary number-theoretic codes that can correct a single asymmetric error. Levenshtein realised that this same construction can correct a single insertion/deletion error. And yet asymmetric and insertion/deletion errors appear to be fundamentally different. This paper explores this scenario. Constantin and Rao showed that any Abelian group of order n + 1 can correct a single asymmetric error. In this paper, we show that only a subset of Abelian groups can correct a single insertion/deletion error.
2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060), 2000
The problem of finding the values of A q (n, d)-the maximum size of a code of length n and minimum distance d over an alphabet of q elements-is considered. Upper and lower bounds on A 4 (n, d) are presented and some values of this function are settled. A table of best known bounds on A 4 (n, d) is given for n ≤ 12. When q ≤ M < 2q, all parameters for which A q (n, d) = M are determined.
Discrete Applied Mathematics, 2009
A binary linear code in F n 2 with dimension k and minimum distance d is called an [n, k, d] code. A t-(n, m, λ) design D is a set X of n points together with a collection of m-subsets of X (called a block) such that every t-subset of X is contained in exactly λ blocks. A constant length code which corrects different numbers of errors in different code words is called a non-uniform error correcting code. Parity sectioned reduction of a linear code gives a non-uniform error correcting code. In this paper a new code, [2 n − 1, n, 2 n−1 ], is developed. The error correcting capability of this code is 2 n−2 − 1 = e. It is shown that this code holds a 2-(2 n − 1, 2 n−1 , 2 n−2 ) design. Also the parity sectioned reduction code after deleting the same g (≤ e) positions of each code word of this code holds a 1-(
Problems of Information Transmission, 2010
We consider sequences in which every symbol of an alphabet occurs at most once. We construct families of such sequences as nonlinear subcodes of a q-ary [n, k, n − k + 1] q Reed-Solomon code of length n ≤ q consisting of words that have no identical symbols. We introduce the notion of a bunch of words of a linear code. For dimensions k ≤ 3 we obtain constructive lower estimates (tight bounds in a number of cases) on the maximum cardinality of a subcode for various n and q, and construct subsets of words meeting these estimates and bounds. We define codes with words that have no identical symbols, observe their relation to permutation codes, and state an optimization problem for them.
Designs, Codes and Cryptography, 2013
Perfect t-deletion-correcting codes of length n over the alphabet of size q, denoted by perfect (n, t) q-DCCs, can have different number of codewords, because the balls of radius t with respect to Levenshteȋn distance may be of different sizes. Thus determining all possible sizes of a perfect t-deletion-correcting code makes sense. When t = n − 2, t-deletion-correcting codes are closely related to directed packings, constructions of which are based on the tools of design theory. Recently, Chee, Ge and Ling determined completely the spectrum of possible sizes for perfect q-ary 1-deletion-correcting codes of length three for all q, and perfect q-ary 2-deletion-correcting codes of length four for all but 19 values of q. In this paper, we continue to investigate the spectrum problem for perfect (4, 2) q-DCCs. By constructing a considerable number of incomplete directed packings, we give an almost complete solution to the spectrum problem of sizes for perfect (4, 2) q-DCCs, leaving the existence of (4, 2) 19-DCC of size 62 and (4, 2) 34-DCC of size 196 in doubt. Keywords Deletion-correcting codes • Directed packings • Group divisible designs • Optimal codes • Perfect codes Mathematics Subject Classification 94B25 • 94B60 • 05B05 Communicated by D. Jungnickel.
2014 IEEE International Symposium on Information Theory, 2014
The rank modulation scheme has been proposed for efficient writing and storing data in non-volatile memory storage. Error-correction in the rank modulation scheme is done by considering permutation codes. In this paper we consider codes in the set of all permutations on n elements, Sn, using the Kendall's τ-metric. We prove that there are no perfect single-error-correcting codes in Sn, where n > 4 is a prime or 4 ≤ n ≤ 10. We also prove that if such a code exists for n which is not a prime then the code should have some uniform structure. We define some variations of the Kendall's τ-metric and consider the related codes and specifically we prove the existence of a perfect single-error-correcting code in S5. Finally, we examine the existence problem of diameter perfect codes in Sn and obtain a new upper bound on the size of a code in Sn with even minimum Kendall's τ-distance.
Designs, Codes and Cryptography, 1999
A (v, k, λ)-difference set D in a group G can be used to create a symmetric 2-(v, k, λ) design, D, from which arises a code C, generated by vectors corresponding to the characteristic function of blocks of D. This paper examines properties of the code C, and of a subcode, C o = J C, where J is the radical of the group algebra of G over Z 2. When G is a 2-group, it is shown that C o is equivalent to the first-order Reed-Muller code, R(1, 2s + 2), precisely when the 2-divisor of C o is maximal. In addition, if D is a non-trivial difference set in an elementary abelian 2-group, and if D is generated by a quadratic bent function, then C o is equal to a power of the radical. Finally, an example is given of a difference set whose characteristic function is not quadratic, although the 2-divisor of C o is maximal.
Journal of Combinatorial Designs, 2013
For a k-subset X of Z n , the set of differences on X is the set X = {i − j (mod n): i, j ∈ X, i = j } . A conflict-avoiding code CAC of length n and weight k is a collection C of k-subsets of Z n such that X Y = ∅ for any distinct X, Y ∈ C. Let CAC(n, k) be the class of all the CACs of length n and weight k. The maximum size of codes in CAC(n, k) is denoted . A code C ∈ CAC(n, k) is said to be optimal if |C| = M(n, k). An optimal code C is tight equi-difference if X∈C X = Z n \ {0} and each codeword in C is of the form {0, i, 2i, . . . , (k − 1)i}. In this paper, the necessary and sufficient conditions for the existence problem of optimal tight equi-difference conflict-avoiding codes of length n = 2 k ± 1 and weight 3 are given. C 2012 Wiley Periodicals, Inc. J. Combin. Designs 21: 223-231, 2013
IEEE Transactions on Information Theory, 1991
2007
We begin with the definition of Reed-Solomon codes. Definition 1.1 (Reed-Solomon code) . Let Fq be a finite field andFq[x] denote theFq-space of univariate polynomials where all the coefficients of x are fromFq. Pick {α1, α2, ...αn} distinct elements (also calledevaluation points ) of Fq and choosen and k such thatk ≤ n ≤ q. We define an encoding function for Reed-Solomon code as RS : Fq → F n q as follows. A message m = (m0, m1, ..., mk−1) with mi ∈ Fq is mapped to a degree k − 1 polynomial.
SIAM Journal on Discrete Mathematics, 2010
One peculiarity with deletion-correcting codes is that perfect t-deletion-correcting codes of the same length over the same alphabet can have different numbers of codewords, because the balls of radius t with respect to the Levenshteȋn distance may be of different sizes. There is interest, therefore, in determining all possible sizes of a perfect t-deletion-correcting code, given the length n and the alphabet size q. In this paper, we determine completely the spectrum of possible sizes for perfect q-ary 1-deletion-correcting codes of length three for all q, and perfect q-ary 2-deletion-correcting codes of length four for almost all q, leaving only a small finite number of cases in doubt.
Designs, Codes and Cryptography, 2008
We investigate binary sequences which can be obtained by concatenating the columns of (0,1)-matrices derived from permutation sequences. We then prove that these binary sequences are subsets of a surprisingly diverse ensemble of codes, namely the Levenshtein codes, capable of correcting insertion/deletion errors; spectral null codes, with spectral nulls at certain frequencies; as well as being subsets of run-length limited codes, Nyquist null codes and constant weight codes.
IEEE Transactions on Information Theory, 1994
Properties of nonlinear perfect binary codes are investigated and several new constructions of perfect codes are derived from these properties. An upper bound on the cardinality of the intersection of two perfect codes of length n is presented, and perfect codes whose intersection attains the upper bound are constructed for all n. As an immediate consequence of the proof of the upper bound we obtain a simple closed-form expression for the weight distribution of a perfect code. Furthermore, we prove that the characters of a perfect code satisfy certain constraints, and provide a sufficient condition for a binary code to be perfect. The latter result is employed to derive a generalization of the construction of Phelps, which is shown to give rise to some perfect codes that are nonequivalent to the perfect codes obtained from the known constructions. Moreover, for any m 2 4 we construct jidl-rank perfect binary codes of length 2" -1. These codes are obviously nonequivalent to any of the previously known perfect codes. Furthermore the latter construction exhibits the existence of full-rank perfect tilings. Finally, we construct a set of 22c" nonequivalent perfect codes of length n, for sufficiently large n and a constant c = 0.5 -E. Precise enumeration of the number of codes in this set provides a slight improvement over the results previously reported by Phelps.
Siam Journal on Discrete Mathematics, 2010
A set F of ordered k-tuples of distinct elements of an n-set is pairwise reverse free if it does not contain two ordered k-tuples with the same pair of elements in the same pair of coordinates in reverse order. Let F (n, k) be the maximum size of a pairwise reverse-free set. In this paper we focus on the case of 3-tuples and prove lim F (n, 3)/ n 3 = 5/4, more exactly, 5 24 n 3 − 1 2 n 2 − O(n log n) < F (n, 3) ≤ 5 24 n 3 − 1 2 n 2 + 5 8 n, and here equality holds when n is a power of 3. Many problems remain open.
Designs, Codes and …, 2001
The concept of diameter perfect codes, which seems to be a natural generalization of perfect codes (codes attaining the sphere-packing bound) is introduced. This was motivated by the "code-anticode" bound of Delsarte in distance regular graphs. This bound in conjunction with the recent complete solutions of diametric problems in the Hamming graph H q (n) and the Johnson graph J (n, k) gives a sharpening of the sphere-packing bound. Some necessary conditions for the existence of diameter perfect codes are given. In the Hamming graph all diameter perfect codes over alphabets of prime power size are characterized. The problem of tiling of the vertex set of J (n, k) with caps (and maximal anticodes) is also examined.
Discrete Mathematics, 2009
We replace the usual setting for error-correcting codes (i.e. vector spaces over finite fields) with that of permutation groups. We give an algorithm which uses a combinatorial structure which we call an uncovering-by-bases, related to covering designs, and construct some examples of these. We also analyse the complexity of the algorithm. We then formulate a conjecture about uncoverings-by-bases, for which we give some supporting evidence and prove for some special cases. In particular, we consider the case of the symmetric group in its action on 2-subsets, where we make use of the theory of graph decompositions. Finally, we discuss the implications this conjecture has for the complexity of the decoding algorithm.
Quantum Electronics, 2005
The algebraic solution of a`complex' problem of synthesis of phase-coded (PC) sequences with the zero level of side lobes of the cyclic autocorrelation function (ACF) is proposed. It is shown that the solution of the synthesis problem is connected with the existence of difference sets for a given code dimension. The problem of estimating the number of possible code combinations for a given code dimension is solved. It is pointed out that the problem of synthesis of PC sequences is related to the fundamental problems of discrete mathematics and, érst of all, to a number of combinatorial problems, which can be solved, as the number factorisation problem, by algebraic methods by using the theory of Galois éelds and groups.
2022 IEEE International Symposium on Information Theory (ISIT)
Motivated by applications to DNA-storage, flash memory, and magnetic recording, we study perfect burstcorrecting codes for the limited-magnitude error channel. These codes are lattices that tile the integer grid with the appropriate error ball. We construct two classes of such perfect codes correcting a single burst of length 2 for (1, 0)-limited-magnitude errors, both for cyclic and non-cyclic bursts. We also present a generic construction that requires a primitive element in a finite field with specific properties. We then show that in various parameter regimes such primitive elements exist, and hence, infinitely many perfect burst-correcting codes exist. Index Terms Integer coding, perfect codes, burst-correcting codes, lattices, limited-magnitude errors I. INTRODUCTION In many communication or storage systems, errors tend to occur in close proximity to each other, rather than occurring independently of each other. If the errors are confined to an interval of positions of length b, they are referred to as a burst of length b. Note that not all the positions in the interval are necessarily erroneous. A code that can correct any single burst of length b is called a b-burst-correcting code. The design of burst-correcting codes has been researched in the error models of substitutions, deletions and insertions. Concerning the substitutions, Abdel-Ghaffar et al. [1], [2] showed the existence of optimum cyclic bburst-correcting codes for any fixed b, and Etzion [10] gave a construction for perfect binary 2-burst-correcting codes. As for deletions and insertions, it has been shown in [20] that correcting a single burst of deletions is equivalent to correcting a single burst of insertions. Codes correcting a burst of exactly b consecutive deletions, or a burst of up to b consecutive deletions, were presented in [17], [20], with the redundancy being of optimal asymptotic order. The b-burst-correcting codes pertaining to deletions were treated in [3], called codes correcting localized deletions therein, and a class of such codes of asymptotically optimal redundancy was proposed. Similarly, permutation codes correcting a single burst of b consecutive deletions were studied in [8].
Theoretical Computer Science, 2005
The centralizer of a set of words X is the largest set of words C(X) commuting with X: XC(X) = C(X)X. It has been a long standing open question due to , whether the centralizer of any rational set is rational. While the answer turned out to be negative in general, see Kunc 2004, we prove here that the situation is different for codes: the centralizer of any rational code is rational and if the code is finite, then the centralizer is finitely generated. This result has been previously proved only for binary and ternary sets of words in a series of papers by the authors and for prefix codes in an ingenious paper by Ratoandromanana 1989 -many of the techniques we use in this paper follow her ideas. We also give in this paper an elementary proof for the prefix case.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.