scholarly journals Codes and Projective Multisets

10.37236/1375 ◽  
1998 ◽  
Vol 5 (1) ◽  
Author(s):  
Stefan Dodunekov ◽  
Juriaan Simonis

The paper gives a matrix-free presentation of the correspondence between full-length linear codes and projective multisets. It generalizes the Brouwer-Van Eupen construction that transforms projective codes into two-weight codes. Short proofs of known theorems are obtained. A new notion of self-duality in coding theory is explored.

2014 ◽  
Vol 14 (2) ◽  
pp. 31-37 ◽  
Author(s):  
P. K. Das

Abstract Coding theory has started with the intention of detection and correction of errors which have occurred during communication. Different types of errors are produced by different types of communication channels and accordingly codes are developed to deal with them. In 2013 Sharma and Gaur introduced a new kind of an error which will be termed “key error”. This paper obtains the lower and upper bounds on the number of parity-check digits required for linear codes capable for detecting such errors. Illustration of such a code is provided. Codes capable of simultaneous detection and correction of such errors have also been considered.


2017 ◽  
Vol 09 (03) ◽  
pp. 1750035
Author(s):  
Jian Gao ◽  
Fanghui Ma

Quadratic residue (QR) codes and their extensions over the finite non-chain ring [Formula: see text] are studied, where [Formula: see text], [Formula: see text] is an odd prime and [Formula: see text]. A class of Gray maps preserving the self-duality of linear codes from [Formula: see text] to [Formula: see text] is given. Under a special Gray map, a self-dual code [Formula: see text] over [Formula: see text], a formally self-dual code [Formula: see text] over [Formula: see text] and a formally self-dual code [Formula: see text] over [Formula: see text] are obtained from extended QR codes.


2008 ◽  
Vol 01 (03) ◽  
pp. 303-335 ◽  
Author(s):  
B. K. Dass ◽  
Rashmi Verma

Many kinds of errors in coding theory have been dealt with for which codes have been constructed to combat such errors. Though there is a long history concerning the growth of the subject and many of the codes developed have found applications in numerous areas of practical interest, one of the areas of practical importance in which a parallel growth of the subject took place is that of burst error detecting and correcting codes. The nature of burst errors differ from channel to channel depending upon the behaviour of channels or the kind of errors which occur during the process of data transmission. In very busy communication channels, errors repeat themselves more frequently. In view of this, it is desirable to consider repeated burst errors. The paper presents lower and upper bounds on the number of parity-check digits required for a linear code correcting errors in the form of repeated bursts. An upper bound for a code that detects m-repeated bursts has also been derived. Illustrations of several codes that correct 2-repeated bursts of different lengths have also been given.


Author(s):  
Rong Wang ◽  
Xiaoni Du ◽  
Cuiling Fan ◽  
Zhihua Niu

Due to their important applications to coding theory, cryptography, communications and statistics, combinatorial [Formula: see text]-designs have attracted lots of research interest for decades. The interplay between coding theory and [Formula: see text]-designs started many years ago. It is generally known that [Formula: see text]-designs can be used to derive linear codes over any finite field, and that the supports of all codewords with a fixed weight in a code also may hold a [Formula: see text]-design. In this paper, we first construct a class of linear codes from cyclic codes related to Dembowski-Ostrom functions. By using exponential sums, we then determine the weight distribution of the linear codes. Finally, we obtain infinite families of [Formula: see text]-designs from the supports of all codewords with a fixed weight in these codes. Furthermore, the parameters of [Formula: see text]-designs are calculated explicitly.


2019 ◽  
Vol 12 (2) ◽  
pp. 668-679
Author(s):  
Basri Çalışkan ◽  
Kemal Balıkçı

In Algebraic Coding Theory, all linear codes are described by generator matrices. Any linear code has many generator matrices which are equivalent. It is important to find the number of the generator matrices for constructing of these codes. In this paper, we study Z_2 Z_4 Z_8-additive codes, which are the extension of recently introduced Z_2 Z_4-additive codes. We count the number of arbitrary Z_2 Z_4 Z_8-additive codes. Then we investigate connections to Z_2 Z_4 and Z_2 Z_8-additive codes with Z_2 Z_4 Z_8, and give some illustrative examples.


Author(s):  
Najm A.M. Al-Seraji ◽  
Hossam H. Jawad

In this research, the main purposes are making partitions of the projective line, PG (1, q3), q=17, and embedding the projective line, PG (1, q ) into PG (1, q3), as well as finding some partitions of PG (2, q2) as subplanes, orbits, triangles and arcs, and studying the properties of these subsets. Furthermore, the arcs with different degrees and sizes are found besides the embedding of the projective plane, PG (2,q) into PG (2, q2). In the coding theory, there are 14 projective codes that are introduced.


Author(s):  
Binbin Pang ◽  
Shixin Zhu ◽  
Liqi Wang

Entanglement-assisted quantum error-correcting codes (EAQECCs) can be obtained from arbitrary classical linear codes based on the entanglement-assisted stabilizer formalism, which greatly promoted the development of quantum coding theory. In this paper, we construct several families of [Formula: see text]-ary entanglement-assisted quantum maximum-distance-separable (EAQMDS) codes of lengths [Formula: see text] with flexible parameters as to the minimum distance [Formula: see text] and the number [Formula: see text] of maximally entangled states. Most of the obtained EAQMDS codes have larger minimum distances than the codes available in the literature.


2020 ◽  
Vol 14 (1) ◽  
pp. 95-109
Author(s):  
Gustavo Banegas ◽  
Paulo S. L. M. Barreto ◽  
Edoardo Persichetti ◽  
Paolo Santini

AbstractCryptographic primitives from coding theory are some of the most promising candidates for NIST’s Post-Quantum Cryptography Standardization process. In this paper, we introduce a variety of techniques to improve operations on dyadic matrices, a particular type of symmetric matrices that appear in the automorphism group of certain linear codes. Besides the independent interest, these techniques find an immediate application in practice. In fact, one of the candidates for the Key Exchange functionality, called DAGS, makes use of quasi-dyadic matrices to provide compact keys for the scheme.


2013 ◽  
Vol 2 (1) ◽  
pp. 143-150
Author(s):  
P.K. Das

Detecting and correcting errors is one of the main tasks in coding theory. The bounds are important in terms of error-detecting and -correcting capabilities of the codes. Solid Burst error is common in several communication channels. This paper obtains lower and upper bounds on the number of parity-check digits required for linear codes capable of correcting any solid burst error of length b or less and simultaneously detecting any solid burst error of length s(>b) or less. Illustration of such a code is also provided.Keywords: Parity check matrix, Syndromes, Solid burst errors, Standard arrayDOI: 10.18495/comengapp.21.143150  


1978 ◽  
Vol 84 (2) ◽  
pp. 191-205 ◽  
Author(s):  
Raymond Hill

AbstractThe packing problem for (k, 3)-caps is that of finding (m, 3)r, q, the largest size of (k, 3)-cap in the Galois space Sr, q. The problem is tackled by exploiting the interplay of finite geometries with error-correcting codes. An improved general upper bound on (m, 3)3 q and the actual value of (m, 3)3, 4 are obtained. In terms of coding theory, the methods make a useful contribution to the difficult task of establishing the existence or non-existence of linear codes with certain weight distributions.


Sign in / Sign up

Export Citation Format

Share Document