共查询到20条相似文献,搜索用时 0 毫秒
1.
Shadow bounds for self-dual codes 总被引:5,自引:0,他引:5
Rains E.M. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1998,44(1):134-139
Conway and Sloane (1990) have previously given an upper bound on the minimum distance of a singly-even self-dual binary code, using the concept of the shadow of a self-dual code. We improve their bound, finding that the minimum distance of a self-dual binary code of length n is at most 4[n/24]+4, except when n mod 24=22, when the bound is 4[n/24]+6. We also show that a code of length a multiple of 24 meeting the bound cannot be singly-even. The same technique gives similar results for additive codes over GF(4) (relevant to quantum coding theory) 相似文献
2.
Krasikov I. Litsyn S. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1997,43(4):1238-1244
Using a variant of the linear programming method we derive a new upper bound on the minimum distance d of doubly-even self-dual codes of length n. Asymptotically, for n growing, it gives d/n⩽0.166315···+o(1), thus improving on the Mallows-Odlyzko-Sloane bound of 1/6. To establish this, we prove that in any doubly even-self-dual code the distance distribution is asymptotically upper-bounded by the corresponding normalized binomial distribution in a certain interval 相似文献
3.
Loeliger H.-A. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1997,43(6):1767-1773
General random coding theorems for lattices are derived from the Minkowski-Hlawka theorem and their close relation to standard averaging arguments for linear codes over finite fields is pointed out. A new version of the Minkowski-Hlawka theorem itself is obtained as the limit, for p→∞, of a simple lemma for linear codes over GF(p) used with p-level amplitude modulation. The relation between the combinatorial packing of solid bodies and the information-theoretic “soft packing” with arbitrarily small, but positive, overlap is illuminated. The “soft-packing” results are new. When specialized to the additive white Gaussian noise channel, they reduce to (a version of) the de Buda-Poltyrev result that spherically shaped lattice codes and a decoder that is unaware of the shaping can achieve the rate 1/2 log2 (P/N) 相似文献
4.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1963,9(3):198-205
The author has previously developed a new upper bound on nonsystematic binary error-correcting codes, using a sphere-packing approach and combinatorial analysis. A significant refinement is now added; together with a detailed study of the asymptotic behavior of the upper bound, this enables one to show that any large code must {em correct} almost all sequences with a larger number of errors than the code was designed for. This excess is expressed numerically as a fraction of the designed error-correcting capability of the code. The fraction is a function of the ratio of the sequence length and the designed error-correcting capability. A possible application might be in the use of a larger code giving almost certain error correction rather than a smaller one with certain correction capability. 相似文献
5.
New performance bounds for turbo codes 总被引:1,自引:0,他引:1
We derive a new upper bound on the word- and bit-error probabilities of turbo codes with maximum-likelihood decoding by using the Gallager bound. Since the derivation of the bound for a given interleaver is intractable, we assume uniform interleaving as in the derivation of the standard union bound for turbo codes. The result is a generalization of the transfer function bound and remains useful for a wider range of signal-to-noise ratios, particularly for some range below the channel cutoff rate. The new bound is also applicable to other linear codes 相似文献
6.
Hou X.-D. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1990,36(4):895-899
Some new lower bounds on |C| for a binary linear [n , k ]R code C with n +1=t (R +1)-r (0⩽r <R +1, t >2 odd) or with n +1=t (R +1)-1(t >2 even) are obtained. These bounds improve the sphere covering bound considerably and give several new values and lower bounds for the function t [n , k ], the smallest covering radius of any [n , k ] code 相似文献
7.
Dontcheva R. Harada M. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2002,48(7):2060-2064
New extremal self-dual codes of length 62 are constructed with weight enumerators of three different types. Two of these types were not represented by any known code up till now. All these codes possess an automorphism of order 15. Some of them are used to construct extremal self-dual codes of length 60 by the method of subtracting. By additional subtracting, an extremal self-dual [58, 29, 10] code was obtained having a weight enumerator which does not correspond to any code known so far 相似文献
8.
Etzion T. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1991,37(6):1696-1704
New lower bounds on the sizes of asymmetric codes and unidirectional codes are presented. Various methods are used, three of them of special interest. The first is a partitioning method that is a modification of a method used to construct constant weight codes. The second is a combining codes method that is used to obtain a new code from a few others. The third method is shortening by weights that is applied on symmetric codes or on codes generated by the combining codes method. Tables for the sizes of codes of length n ⩽23 are presented 相似文献
9.
New lower bounds for constant weight codes 总被引:1,自引:0,他引:1
van Pul C.L.M. Etzion T. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1989,35(6):1324-1329
Some new lower bounds are given for A (n ,4,w ), the maximum number of codewords in a binary code of length n , minimum distance 4, and constant weight w . In a number of cases the results significantly improve on the best bounds previously known 相似文献
10.
Buyuklieva S. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1997,43(5):1607-1612
All extremal binary self-dual codes of lengths 42 and 44 which have an automorphism of order 5 with eight independent cycles are obtained up to equivalence. There are 109 inequivalent [42, 21, 8] codes with such an automorphism. All [44, 22, 8] codes that are obtained have 29 different weight enumerators 相似文献
11.
卡氏积码的MDR码和自对偶码 总被引:1,自引:0,他引:1
定义了Z_(r_1),Z_(r_2)…,Z_(r_s)上线性码C_1,C_2,…,C_s的卡氏积码.利用子模同构定理,研究了在Z_(r_1)×Z_(r_2)×…×Z_(r_s)上卡氏积码C_1×C_2×…×C_s的秩与在Z_(r_1),Z_(r_2),…,Z_(r_s)码C_1,C_2,…,C_s的秩的关系,借助这一关系,得到了MDR码的卡氏积仍为MDR码和自对偶码的卡氏积码也为自对偶码. 相似文献
12.
Cubic self-dual binary codes 总被引:1,自引:0,他引:1
Bonnecaze A. Bracco A.D. Dougherty S.T. Nochefranca L.R. Sole P. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2003,49(9):2253-2258
We study binary self-dual codes with a fixed point free automorphism of order three. All binary codes of that type can be obtained by a cubic construction that generalizes Turyn's. We regard such "cubic" codes of length 3/spl lscr/ as codes of length /spl lscr/ over the ring F/sub 2//spl times/F/sub 4/. Classical notions of Type II codes, shadow codes, and weight enumerators are adapted to that ring. Two infinite families of cubic codes are introduced. New extremal binary codes in lengths /spl les/ 66 are constructed by a randomized algorithm. Necessary conditions for the existence of a cubic [72,36,16] Type II code are derived. 相似文献
13.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1987,33(2):177-195
A new technique is proposed for constructing trellis codes. which provides an alternative to Ungerboeck's method of "set partitioning." The new codes use a signal constellation consisting of points from ann -dimensional latticeLambda , with an equal number of points from each coset of a sublatticeLambda ' . One part of the input stream drives a generalized convolutional code whose outputs are cosets ofLambda ' , while the other part selects points from these cosets. Several of the new codes are better than those previously known. 相似文献
14.
Daskalov R.N. Kapralov S.N. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1992,38(6):1795-1796
Let an [n , k , d ]-code denote a binary linear code of length n , dimension k , and minimum distance at least d . Define d (n , k ) as the maximum value of d for which there exists a binary linear [n , k , d ]-code. T. Verhoeff (1989) has provided an updated table of bounds on d (n , k ) for 1⩽k ⩽n ⩽127. The authors improve on some of the upper bounds given in that table by proving the nonexistence of codes with certain parameters 相似文献
15.
Salomon A.J. Amrani O. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2005,51(11):3918-3930
This paper concerns the construction of the so-called augmented product codes and augmented product lattices. These are obtained by augmenting product codes or product lattices from certain classes thus obtaining higher dimensional codes or lattices from the same class, respectively. Certain properties of the augmented product construction are derived, and specific construction examples are given. In particular, it is shown that the Reed-Muller codes, the Golay code, the Barnes-Wall lattices, as well as the Leech lattice all have various augmented product constructions. 相似文献
16.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1972,18(3):409-414
The weight enumerator of a code is the polynomial begin{equation} W(x,y)= sum_{r=0}^n A_r x^{n-r} y^r, end{equation} wheren denotes the block length andA_r , denotes the number of codewords of weightr . LetC be a self-dual code overGF(q) in which every weight is divisible byc . Then Gleason's theorem states that 1) ifq = 2 andc = 2, the weight enumerator ofC is a sum of products of the polynomialsx^2 + y^2 andx^2y^2 (x^2 - y^2 )^2 ifq = 2 andc = 4, the weight enumerator is a sum of products ofx^8 + 14x^4 y^4 + y^8 andx^4 y^4 (x^4 - y^4)^4 ; and 3) ifq = 3 andc = 3, the weight enumerator is a sum of products ofx^4 + 8xy^3 andy^3(x^3 - y^3)^3 . In this paper we give several proofs of Gleason's theorem. 相似文献
17.
Weight enumerators of self-dual codes 总被引:4,自引:0,他引:4
Brualdi R.A. Pless V.S. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1991,37(4):1222-1225
Some construction techniques for self-dual codes are investigated, and the authors construct a singly-even self-dual [48,24,10]-code with a weight enumerator that was not known to be attainable. It is shown that there exists a singly-even self-dual code C ' of length n =48 and minimum weight d =10 whose weight enumerator is prescribed in the work of J.H. Conway et al. (see ibid., vol.36, no.5, p.1319-33, 1990). Two self-dual codes of length n are called neighbors, provided their intersection is a code of dimension (n /2)-1. The code C' is a neighbor of the extended quadratic residue code of length 48 相似文献
18.
San Ling Sole P. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2003,49(4):1052-1053
We show that there are long binary quasi-cyclic self-dual (either Type I or Type II) codes satisfying the Gilbert-Varshamov bound. 相似文献
19.
Fang-Wei Fu San Ling Chaoping Xing 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2003,49(12):3294-3299
In this correspondence, we study binary asymmetric error-correcting codes. A general construction for binary asymmetric error-correcting codes is presented. We show that some previously known lower bounds for binary asymmetric error-correcting codes can be obtained from this general construction. Furthermore, some new lower bounds for binary asymmetric error-correcting codes are obtained from this general construction. These new lower bounds improve the existing ones. 相似文献
20.
Marijke De Soete 《Journal of Cryptology》1991,3(3):173-186
We investigate authentication codes with splitting, using the mathematical model introduced by Simmons. Besides an overview of the existing bounds, we obtain some new bounds for the probability of deception of the transmitter/ receiver in case of an impersonation or substitution game. We also prove some new bounds for a spoofing attack of order L. Further, we give several new constructions for authentication/secrecy codes with splitting, derived from finite incidence structures such as partial geometries and affine resolvable designs. In some of these codes the bounds are attained with equality. 相似文献