Formally Self-Dual Codes Related to Type II Codes
|
|
- Joshua Cook
- 5 years ago
- Views:
Transcription
1 Formally Self-Dual Codes Related to Type II Codes Koichi Betsumiya Graduate School of Mathematics Nagoya University Nagoya , Japan and Masaaki Harada Department of Mathematical Sciences Yamagata University Yamagata , Japan March 17, 2000 Abstract It is known that shadows play an important role in the study of self-dual codes. In this note, we give constructions of formally self-dual codes using self-dual codes and their shadows. We introduce a class of binary formally self-dual codes related to extremal Type II codes. A binary formally self-dual [24, 12, 7] code is obtained from the extended Golay code. It is shown that there is a unique binary [24, 12, 7] code with dual distance 7, up to equivalence. Keywords: Formally self-dual codes, Type II codes and codes over Z 2k. 1 Introduction Shadows play an important role in the study of self-dual codes. Shadows of binary Type I codes were introduced by Conway and Sloane [3]. They are used to determine upper bounds on the minimum weights of binary Type I codes. Brualdi and Pless [2] gave constructions This work was partially supported by the Grant-in-Aid for Scientific Research (No ), the Ministry of Education, Science, Sports and Culture, Japan, and the Sumitomo Foundation (No ), Japan. 1
2 of binary self-dual codes of lengths n + 2 and n + 4 from Type I codes of length n and their shadows by investigating orthogonality relations between the four cosets of the doubly-even subcode C 0 of a given Type I code C into C 0. Recently Type II codes codes over the ring Z 2k of integers modulo 2k have been introduced in [1] together with shadows for Type I codes over Z 2k. Shadows of Type I codes over Z 2k are widely studied in [5]. For example, shadows are used in [5] in order to construct larger self-dual codes as a generalization of the constructions in [2]. In this note, we study formally self-dual codes over Z 2k constructed from Type I codes with shadows. In Section 3, we give constructions of formally self-dual codes using self-dual codes and their shadows. In Section 4, we introduce a class of binary formally self-dual codes related to extremal Type II codes. In particular, we give the weight enumerator of a formally self-dual code related to an extremal Type II [72, 36, 16] code. The existence of an extremal Type II [72, 36, 16] code is a long-standing open problem. A binary formally self-dual [24, 12, 7] code is obtained from the extended Golay code. In Section 5, it is shown that there is a unique binary [24, 12, 7] code with dual distance 7, up to equivalence. 2 Self-Dual Codes and Shadows We give definitions for self-dual codes over Z 2k (see [1] for a complete description). The case k = 1 is usual binary codes. A code C of length n over Z 2k (or a Z 2k -code of length n) is a Z 2k -submodule of Z n 2k where Z 2k is the ring of the integers modulo 2k. The Hamming weight wt H (x) of a vector x in Z n 2k is the number of non-zero components. The Euclidean weight wt E (x) of a vector x = (x 1, x 2,..., x n ) is n i=1 min{x 2 i, (2k x i ) 2 }. The symmetrized weight enumerator of C is defined as swe C (x 0, x 1,..., x k ) = c C x n 0(c) 0 x n 1(c) 1 x n k 1(c) k 1 x n k(c) k, where n 0 (c), n 1 (c),..., n k 1 (c), n k (c) are the numbers of 0, ±1,..., ±(k 1), k components of c, respectively. For x = (x 1,..., x n ) and y = (y 1,..., y n ), we define the inner-product of x and y in Z n 2k by x y = x 1 y x n y n. The dual code C of C is defined as C = {x Z n 2k x y = 0 for all y C}. C is self-dual if C = C. Self-dual Z 2k -codes with the property that all Euclidean weights are divisible by 4k are called Type II [1]. A self-dual code which is not Type II is called Type I. A code C is a formally self-dual code with respect to the symmetrized weight enumerator if swe C (x 1, x 2,..., x k ) = swe C (x 1, x 2,..., x k ). A self-dual code is formally self-dual. Let C be a Type I Z 2k -code of length n. Let C 0 be the subcode of codewords whose Euclidean weights are a multiple of 4k. C 0 is a subcode of index 2 in C. Let C 2 be the unique nontrivial coset of C 0 into C. Then C0 can be written as a union of cosets of C 0 : 2
3 C0 = C 0 C 2 C 1 C 3. The shadow of C is defined to be S = C 1 C 3 (see [1], [5] for the details). Throughout this note, C i s (i = 0, 1, 2, 3) denote the cosets for C. 3 Construction of Formally Self-Dual Codes In this section, we give constructions of formally self-dual codes over Z 2k using self-dual codes and their shadows. Lemma 3.1 (Dougherty et al. [5]) Suppose that C is a Type I code over Z 2k of length n. If n 2 (mod 4) then Table 1 holds where the symbol in position (i, j) means that x y = 0 and the symbol means that x y = k for any vector x C i and any vector y C j. Table 1: Orthogonality Relations C 0 C 1 C 2 C 3 C 0 C 1 C 2 C 3 Proposition 3.2 Suppose that there are Type I Z 2k -codes C and D of lengths n and m, respectively where n m 2 (mod 4). If swe C1 (x 1, x 2,..., x k ) = swe C3 (x 1, x 2,..., x k ) and swe D1 (x 1, x 2,..., x k ) = swe D3 (x 1, x 2,..., x k ) then the code E = (C 0, D 0 ) (C 1, D 1 ) (C 3, D 2 ) (C 2, D 3 ), is a formally self-dual code with respect to the symmetrized weight enumerator, that is, swe E (x 1, x 2,..., x k ) = swe E (x 1, x 2,..., x k ). Proof. It follows from Lemma 3.1 that the dual code of E is E has symmetrized weight enumerator (C 0, D 0 ) (C 2, D 1 ) (C 1, D 2 ) (C 3, D 3 ). swe E (x 0, x 1,..., x k ) = swe C0 (x 0, x 1,..., x k ) swe D0 (x 0, x 1,..., x k ) +swe C1 (x 0, x 1,..., x k ) swe D1 (x 0, x 1,..., x k ) +swe C3 (x 0, x 1,..., x k ) swe D2 (x 0, x 1,..., x k ) +swe C2 (x 0, x 1,..., x k ) swe D3 (x 0, x 1,..., x k ). 3
4 From the assumption on the symmetrized weight enumerators, E is formally self-dual. Remark. Since (x 1, y 1 ) (C 1, D 1 ) is not orthogonal to (x 3, y 2 ) (C 3, D 2 ), the code E is not self-dual. We consider some Type I codes over Z 4 as an example of the above construction. Examples of binary codes are given in the next section. Let A 1 be the self-dual Z 4 -code of length 1 with generator matrix (2). Let C and D be the direct sums of two and six copies of A 1. It turns out that C 0 = {(00), (22)}, C 2 = (20) + C 0, C 1 = (11) + C 0 and C 3 = (31) + C 0. Similarly, D 0 = {2(a 1, a 2, a 3, a 4, a 5, a 6 ) a i {0, 1}, 6 i=1 a i 0 (mod 2)}, D 2 = (200000) + D 0, D 1 = (111111) + D 0 and D 3 = (311111) + D 0. Hence we have swe C1 (x 0, x 1, x 2 ) = swe C3 (x 0, x 1, x 2 ) and swe D1 (x 0, x 1, x 2 ) = swe D3 (x 0, x 1, x 2 ). By the above proposition, a formally self-dual code of length 8 with respect to the symmetrized weight enumerator is constructed. The formally self-dual code has the following symmetrized weight enumerator x x x 0 x 2 1x x 0 x 6 1x x 2 0x x 3 0x 2 1x x 4 0x x 5 0x 2 1x x 6 0x x 8 0. Let C and D be codes over Z 2k such that the symmetrized weight enumerators of C and D are the same. The two lattices from C and D by Construction A (see [1] for the details) have the identical theta series. Thus the lattice from a formally self-dual code over Z 2k with respect to the symmetrized weight enumerator has the same theta series as the dual lattice. The lattice constructed from the above formally self-dual code over Z 4 has the following theta series q 3/ q q 5/ q 7/ q 4 +, which is the same as the dual lattice. 4 Binary Formally Self-Dual Codes In this section, we give constructions of binary formally self-dual codes. From now on, all codes are binary. These give a class of such codes related to extremal Type II codes. Proposition 4.1 Let C be a binary Type I code of length n with the shadow S = C 1 C 3 where C 0 is the subcode of doubly-even vectors of C. (1) Suppose that n 2 (mod 4). Let C be the code of length n+2 obtained by extending C0 as follows: (0, 0, C 0 ), (1, 0, C 2 ), (0, 1, C 1 ), (1, 1, C 3 ). If W C1 (y) = W C3 (y) then C is a formally self-dual code with weight enumerator W C0 (y) + y(w C1 (y) + W C2 (y)) + y 2 W C3 (y), 4
5 where W D (y) denotes the (Hamming) weight enumerator of D. (2) Suppose that n 0 (mod 4). Let C be the code of length n + 4 generated by (1, 0, 1, 1, 0,..., 0) and the following extension of C 0 : (0, 0, 0, 0, C 0 ), (1, 1, 0, 0, C 2 ), (1, 1, 1, 0, C 1 ), (0, 0, 1, 0, C 3 ). Then C is a formally self-dual code with weight enumerator (1 + y 3 )W C0 (y) + (y 2 + y 3 )(W C1 (y) + W C2 (y)) + (y + y 2 )W C3 (y). Proof. (1) is a special case of Proposition 3.2. The orthogonality relations between the cosets C 0, C 1, C 2 and C 3 were determined in [2, Tables I and II] (see also Table 1). It follows from the relation that D is the dual code of C. Since W C1 (y) = W C3 (y), C is formally self-dual. Similarly, the dual code of C is the code generated by (1, 1, 0, 1, 0,..., 0) and the following extension of C 0 : (0, 0, 0, 0, C 0 ), (0, 0, 1, 1, C 2 ), (0, 1, 1, 1, C 1 ), (0, 1, 0, 0, C 3 ). Thus C is formally self-dual. By the above construction, we give a class of formally self-dual codes related to extremal Type II codes. Corollary 4.2 If there is an extremal Type II [8k, 4k, 4[k/3]+4] code then there is a formally self-dual [8k, 4k, d 4[k/3] + 3] code. Proof. Let B be an extremal Type II [8k, 4k, 4[k/3] + 4] code. Let C be a Type I child of B, that is C is constructed from B by subtracting. Then C is a Type I [8k 2, 4k 1, 4[k/3]+2] code and the shadow has minimum weight 4[k/3] + 3. It follows from [6, Theorem 3.5] that W C1 (y) = W C3 (y). By Proposition 4.1, C is a formally self-dual code of length 8k. The minimum weight of C is min{d(c 2 ) + 1, d(c 3 ) + 1} where d(d) denotes the minimum weight of D. Since d(c 2 ) = 4[k/3] + 2 and d(c 3 ) 4[k/3] + 3, the minimum weight of C is greater than or equal to 4[k/3] + 3. If the above Type II code has generator matrix of the form ( I 4k A ) then the above formally self-dual code has the following generator matrix A.. I 4k
6 Recently Rains [7] shows that the minimum weight of a self-dual code of length n is bounded by 4 [ ] n , if n 22 (mod 24), d 4 [ ] n , otherwise, and that any self-dual [24l, 12l, 4l + 4] code is Type II. By Theorem 3.6 in [6], the child D of an extremal Type II [24l, 12l, 4l + 4] code has the shadow of minimum weight 4l + 3 exactly. Thus the formally self-dual code has smaller minimum weight than an extremal Type II code of the same length, but it has larger minimum weight than any Type I code of the same length. These cases are investigated. l = 1: The weight enumerators of a Type I code and its shadow are given in [3] for lengths up to 64 and length 72. Let C be the unique Type I [22, 11, 6] code, then W C (y) = y y y 10 +, W C1 (y) = 176y y Then C is a formally self-dual [24, 12, 7] code with weight enumerator y y y 9 +. l = 2: Let C be a Type I [48, 24, 10] code, then W C (y) = y y y 14 + W C1 (y) = 3312y y The extended quadratic residue code QR 48 of length 48 is only one known extremal Type II code of length 48. By the above corollary, a formally self-dual [48, 24, 11] code C 48 is constructed from QR 48. The weight enumerator of C 48 is y y y Note that only formally self-dual codes with minimum weight 10 which are not self-dual are previously known. l = 3: Let C be a Type I [70, 35, 14] code. The existence of such a code is not known. The next case is length 72 and related to an extremal Type II [72, 36, 16] code. The existence of an extremal Type II [72, 36, 16] code is a long-standing open problem. A formally self-dual code F 72 of length 72 is constructed from a Type I [70, 35, 14] code C by Proposition 4.1. The weight distribution of F 72 is listed in Table 2. Note that the weight distributions of C and its shadow are given in [4]. Thus we have the following: Corollary 4.3 If there is no linear [72, 36, 15] code with weight distribution given in Table 2, then there is no extremal Type II [72, 36, 16] code. 6
7 Table 2: The weight distribution of F 72 Weight Frequency Weight Frequency [24, 12, 7] Codes with Dual Distance 7 In the previous section, a formally self-dual [24, 12, 7] code is constructed from the extended Golay code. In this section, it is shown that up to equivalence there is a unique [24, 12, 7] code with dual distance 7, that is, the minimum weight of the dual code is 7. We describe how [24, 12, 7] codes with dual distance 7 were classified. We say that a (1, 0)-matrix M is bi-sorted if the rows and columns of M are sorted as binary integers. Lemma 5.1 Any code is equivalent to a code with a generator matrix of the form ( I, A ) where A is bi-sorted. Proof. It is sufficient to show that we obtain a bi-sorted matrix from a given matrix X, by permuting the rows and columns. First we fix some notations used in this proof. Let X be an m n (1, 0)-matrix, x i and x i be the i-th row and column vector of X, respectively. Moreover let z = (z 1, z 2,..., z n ) be a (1, 0)-vector of length n. We may suppose without loss of generality that X = (x p1 x p 1+q 1 x p2 x p 2+q2 x pt x pt+qt ) such that x p k+i = x p k+i+1 for 0 i q k 1, 1 k t, and x p k x p k+1 for 1 k t 1. Let wx (z) k denote the number of non-zero 7
8 components of (z pk, z pk +1,..., z pk +q k ), and w X (z) denote (w X (z) 1, w X (z) 2,..., w X (z) t ). Let R k = {p k, p k + 1,..., p k + q k } and R X = {R 1, R 2,..., R t }. Let X (k) be the k n sub-matrix obtained from the first k rows of X. Suppose that X (k) is bi-sorted and w X(k) (x 1 ) w X(k) (x 2 ) w X(k) (x n ) on the lexicographic order for a fixed k. By permuting columns fixing X (k), X implies X where the each block of x k+1 in R X(k) is (0,..., 0, 1,..., 1). Then it is easy to see that X (k+1) is bi-sorted. Finally, by permuting the rows {k + 2, k + 3,..., n} of X, we obtain a matrix satisfying the assumption for k + 1 from X. By induction, the result follows. Every [24, 12] code is equivalent to a code with generator matrix of the form ( I, A ) where A is a bi-sorted (1, 0)-matrix. Thus we only need to consider the set of bi-sorted (1, 0)-matrices A, rather than the set of generator matrices. The set of bi-sorted matrices A was constructed, row by row, using a back-tracking algorithm under the condition that the first row is ( ) since the minimum weight is 7. Then our computer search shows that there are distinct 602 [24, 12, 7] codes under the condition the dual distance is 7. The C program, which generates the corresponding matrices, is available at Note that the codes have the same weight enumerator as the formally self-dual code of length 24 given in the previous section. Finally, we verified that all the codes are equivalent by Magma. Proposition 5.2 There is a unique [24, 12, 7] code C 24 with dual distance 7, up to equivalence. Remark. Since C 24 is equivalent to the formally self-dual [24, 12, 7] code given in the previous section, the automorphism group is the Mathieu group M 22. Finally we remark that [24, 12, 7] codes are not unique without the assumption that the dual distance is 7. Let B be a matrix obtained by changing a column of A to the all-zero column vector where ( I, A ) is a generator matrix of the extended Golay code. Then ( I, B ) generates a [24, 12, 7] code with dual distance 1. References [1] E. Bannai, S.T. Dougherty, M. Harada and M. Oura, Type II codes, even unimodular lattices, invariant rings, IEEE Trans. Inform. Theory 45 (1999) pp [2] R.A. Brualdi and V.S. Pless, Weight enumerators of self-dual codes, IEEE Trans. Inform. Theory 37 (1991) pp [3] J.H. Conway and N.J.A. Sloane, A new upper bound on the minimal distance of selfdual codes, IEEE Trans. Inform. Theory 36 (1990) pp
9 [4] S.T. Dougherty and M. Harada, New extremal self-dual codes of length 68, IEEE Trans. Inform. Theory 45 (1999) pp [5] S.T. Dougherty, M. Harada and P. Solé, Shadow lattices and shadow codes, Discrete Math., (to appear). [6] G.T. Kennedy and V.S. Pless, A coding theoretic approach to extending designs, Discrete Math. 142 (1995) pp [7] E. Rains, Shadow bounds for self-dual codes, IEEE Trans. Inform. Theory 44 (1998) pp
The Extended Quadratic Residue Code is the only (48; 24; 12) Self-Dual Doubly-Even Code
Brock University Department of Computer Science The Extended Quadratic Residue Code is the only (48; 24; 12) Self-Dual Doubly-Even Code Sheridan K. Houghten, C.W.H. Lam, L.H. Thiel, and J.A. Parker Technical
More informationConstruction C : an inter-level coded version of Construction C
Construction C : an inter-level coded version of Construction C arxiv:1709.06640v2 [cs.it] 27 Dec 2017 Abstract Besides all the attention given to lattice constructions, it is common to find some very
More informationGraph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California
Graph Adjacency Matrix Automata Joshua Abbott, Phyllis Z. Chinn, Tyler Evans, Allen J. Stewart Humboldt State University, Arcata, California Abstract We define a graph adjacency matrix automaton (GAMA)
More information1 Elementary number theory
Math 215 - Introduction to Advanced Mathematics Spring 2019 1 Elementary number theory We assume the existence of the natural numbers and the integers N = {1, 2, 3,...} Z = {..., 3, 2, 1, 0, 1, 2, 3,...},
More informationA Reduction of Conway s Thrackle Conjecture
A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854
More information392D: Coding for the AWGN Channel Wednesday, March 21, 2007 Stanford, Winter 2007 Handout #26. Final exam solutions
92D: Coding for the AWGN Channel Wednesday, March 2, 27 Stanford, Winter 27 Handout #26 Problem F. (8 points) (Lexicodes) Final exam solutions In this problem, we will see that a simple greedy algorithm
More informationMath Introduction to Advanced Mathematics
Math 215 - Introduction to Advanced Mathematics Number Theory Fall 2017 The following introductory guide to number theory is borrowed from Drew Shulman and is used in a couple of other Math 215 classes.
More informationHow Do More Golay Sequences Arise?
How Do More Golay Sequences Arise? Frank Fiedler Jonathan Jedwab May 13, 2005 (revised May 17, 2006) Abstract In 1999 Davis and Jedwab gave a direct construction of Golay complementary sequences over Z
More informationCHAPTER 8. Copyright Cengage Learning. All rights reserved.
CHAPTER 8 RELATIONS Copyright Cengage Learning. All rights reserved. SECTION 8.3 Equivalence Relations Copyright Cengage Learning. All rights reserved. The Relation Induced by a Partition 3 The Relation
More informationNew Constructions of Non-Adaptive and Error-Tolerance Pooling Designs
New Constructions of Non-Adaptive and Error-Tolerance Pooling Designs Hung Q Ngo Ding-Zhu Du Abstract We propose two new classes of non-adaptive pooling designs The first one is guaranteed to be -error-detecting
More informationA geometric non-existence proof of an extremal additive code
A geometric non-existence proof of an extremal additive code Jürgen Bierbrauer Department of Mathematical Sciences Michigan Technological University Stefano Marcugini and Fernanda Pambianco Dipartimento
More informationCalculation of extended gcd by normalization
SCIREA Journal of Mathematics http://www.scirea.org/journal/mathematics August 2, 2018 Volume 3, Issue 3, June 2018 Calculation of extended gcd by normalization WOLF Marc, WOLF François, LE COZ Corentin
More informationTiling Rectangles with Gaps by Ribbon Right Trominoes
Open Journal of Discrete Mathematics, 2017, 7, 87-102 http://www.scirp.org/journal/ojdm ISSN Online: 2161-7643 ISSN Print: 2161-7635 Tiling Rectangles with Gaps by Ribbon Right Trominoes Premalatha Junius,
More information9.5 Equivalence Relations
9.5 Equivalence Relations You know from your early study of fractions that each fraction has many equivalent forms. For example, 2, 2 4, 3 6, 2, 3 6, 5 30,... are all different ways to represent the same
More informationOn the Relationships between Zero Forcing Numbers and Certain Graph Coverings
On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,
More informationLATIN SQUARES AND THEIR APPLICATION TO THE FEASIBLE SET FOR ASSIGNMENT PROBLEMS
LATIN SQUARES AND THEIR APPLICATION TO THE FEASIBLE SET FOR ASSIGNMENT PROBLEMS TIMOTHY L. VIS Abstract. A significant problem in finite optimization is the assignment problem. In essence, the assignment
More informationHomework #5 Solutions Due: July 17, 2012 G = G = Find a standard form generator matrix for a code equivalent to C.
Homework #5 Solutions Due: July 7, Do the following exercises from Lax: Page 4: 4 Page 34: 35, 36 Page 43: 44, 45, 46 4 Let C be the (5, 3) binary code with generator matrix G = Find a standard form generator
More informationDiscrete Mathematics Lecture 4. Harper Langston New York University
Discrete Mathematics Lecture 4 Harper Langston New York University Sequences Sequence is a set of (usually infinite number of) ordered elements: a 1, a 2,, a n, Each individual element a k is called a
More informationLecture 12 March 4th
Math 239: Discrete Mathematics for the Life Sciences Spring 2008 Lecture 12 March 4th Lecturer: Lior Pachter Scribe/ Editor: Wenjing Zheng/ Shaowei Lin 12.1 Alignment Polytopes Recall that the alignment
More informationAXIOMS FOR THE INTEGERS
AXIOMS FOR THE INTEGERS BRIAN OSSERMAN We describe the set of axioms for the integers which we will use in the class. The axioms are almost the same as what is presented in Appendix A of the textbook,
More informationChapter 2. Splitting Operation and n-connected Matroids. 2.1 Introduction
Chapter 2 Splitting Operation and n-connected Matroids The splitting operation on an n-connected binary matroid may not yield an n-connected binary matroid. In this chapter, we provide a necessary and
More informationLecture 22 Tuesday, April 10
CIS 160 - Spring 2018 (instructor Val Tannen) Lecture 22 Tuesday, April 10 GRAPH THEORY Directed Graphs Directed graphs (a.k.a. digraphs) are an important mathematical modeling tool in Computer Science,
More informationarxiv: v2 [math.co] 11 May 2016
THREE-PILE SHARING NIM AND THE QUADRATIC TIME WINNING STRATEGY arxiv:1506.06961v2 [math.co] 11 May 2016 NHAN BAO HO Abstract. We study a variant of 3-pile Nim in which a move consists of taking tokens
More informationLOW-density parity-check (LDPC) codes are widely
1460 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 4, APRIL 2007 Tree-Based Construction of LDPC Codes Having Good Pseudocodeword Weights Christine A Kelley, Member, IEEE, Deepak Sridhara, Member,
More informationarxiv: v1 [cs.it] 9 Feb 2009
On the minimum distance graph of an extended Preparata code C. Fernández-Córdoba K. T. Phelps arxiv:0902.1351v1 [cs.it] 9 Feb 2009 Abstract The minimum distance graph of an extended Preparata code P(m)
More informationIntroduction to Sets and Logic (MATH 1190)
Introduction to Sets and Logic () Instructor: Email: shenlili@yorku.ca Department of Mathematics and Statistics York University Dec 4, 2014 Outline 1 2 3 4 Definition A relation R from a set A to a set
More informationThe Connectivity and Diameter of Second Order Circuit Graphs of Matroids
Graphs and Combinatorics (2012) 28:737 742 DOI 10.1007/s00373-011-1074-6 ORIGINAL PAPER The Connectivity and Diameter of Second Order Circuit Graphs of Matroids Jinquan Xu Ping Li Hong-Jian Lai Received:
More informationOn the construction of nested orthogonal arrays
isid/ms/2010/06 September 10, 2010 http://wwwisidacin/ statmath/eprints On the construction of nested orthogonal arrays Aloke Dey Indian Statistical Institute, Delhi Centre 7, SJSS Marg, New Delhi 110
More informationThe Matrix-Tree Theorem and Its Applications to Complete and Complete Bipartite Graphs
The Matrix-Tree Theorem and Its Applications to Complete and Complete Bipartite Graphs Frankie Smith Nebraska Wesleyan University fsmith@nebrwesleyan.edu May 11, 2015 Abstract We will look at how to represent
More informationGenerell Topologi. Richard Williamson. May 6, 2013
Generell Topologi Richard Williamson May 6, 2013 1 8 Thursday 7th February 8.1 Using connectedness to distinguish between topological spaces I Proposition 8.1. Let (, O ) and (Y, O Y ) be topological spaces.
More informationUnlabeled equivalence for matroids representable over finite fields
Unlabeled equivalence for matroids representable over finite fields November 16, 2012 S. R. Kingan Department of Mathematics Brooklyn College, City University of New York 2900 Bedford Avenue Brooklyn,
More informationNon-zero disjoint cycles in highly connected group labelled graphs
Non-zero disjoint cycles in highly connected group labelled graphs Ken-ichi Kawarabayashi Paul Wollan Abstract Let G = (V, E) be an oriented graph whose edges are labelled by the elements of a group Γ.
More information4&5 Binary Operations and Relations. The Integers. (part I)
c Oksana Shatalov, Spring 2016 1 4&5 Binary Operations and Relations. The Integers. (part I) 4.1: Binary Operations DEFINITION 1. A binary operation on a nonempty set A is a function from A A to A. Addition,
More informationKnow the Well-ordering principle: Any set of positive integers which has at least one element contains a smallest element.
The first exam will be on Wednesday, September 22, 2010. The syllabus will be sections 1.1 and 1.2 in Lax, and the number theory handout found on the class web site, plus the handout on the method of successive
More informationarxiv: v1 [math.co] 24 Aug 2009
SMOOTH FANO POLYTOPES ARISING FROM FINITE PARTIALLY ORDERED SETS arxiv:0908.3404v1 [math.co] 24 Aug 2009 TAKAYUKI HIBI AND AKIHIRO HIGASHITANI Abstract. Gorenstein Fano polytopes arising from finite partially
More informationIntroduction to Graph Theory
Introduction to Graph Theory George Voutsadakis 1 1 Mathematics and Computer Science Lake Superior State University LSSU Math 351 George Voutsadakis (LSSU) Introduction to Graph Theory August 2018 1 /
More informationMath 302 Introduction to Proofs via Number Theory. Robert Jewett (with small modifications by B. Ćurgus)
Math 30 Introduction to Proofs via Number Theory Robert Jewett (with small modifications by B. Ćurgus) March 30, 009 Contents 1 The Integers 3 1.1 Axioms of Z...................................... 3 1.
More informationVertex Magic Total Labelings of Complete Graphs 1
Vertex Magic Total Labelings of Complete Graphs 1 Krishnappa. H. K. and Kishore Kothapalli and V. Ch. Venkaiah Centre for Security, Theory, and Algorithmic Research International Institute of Information
More informationLATIN SQUARES AND TRANSVERSAL DESIGNS
LATIN SQUARES AND TRANSVERSAL DESIGNS *Shirin Babaei Department of Mathematics, University of Zanjan, Zanjan, Iran *Author for Correspondence ABSTRACT We employ a new construction to show that if and if
More informationGraph Theory S 1 I 2 I 1 S 2 I 1 I 2
Graph Theory S I I S S I I S Graphs Definition A graph G is a pair consisting of a vertex set V (G), and an edge set E(G) ( ) V (G). x and y are the endpoints of edge e = {x, y}. They are called adjacent
More informationREGULAR GRAPHS OF GIVEN GIRTH. Contents
REGULAR GRAPHS OF GIVEN GIRTH BROOKE ULLERY Contents 1. Introduction This paper gives an introduction to the area of graph theory dealing with properties of regular graphs of given girth. A large portion
More informationInterval-Vector Polytopes
Interval-Vector Polytopes Jessica De Silva Gabriel Dorfsman-Hopkins California State University, Stanislaus Dartmouth College Joseph Pruitt California State University, Long Beach July 28, 2012 Abstract
More informationThe Further Mathematics Support Programme
Degree Topics in Mathematics Groups A group is a mathematical structure that satisfies certain rules, which are known as axioms. Before we look at the axioms, we will consider some terminology. Elements
More informationarxiv: v4 [math.co] 25 Apr 2010
QUIVERS OF FINITE MUTATION TYPE AND SKEW-SYMMETRIC MATRICES arxiv:0905.3613v4 [math.co] 25 Apr 2010 AHMET I. SEVEN Abstract. Quivers of finite mutation type are certain directed graphs that first arised
More informationIntroduction III. Graphs. Motivations I. Introduction IV
Introduction I Graphs Computer Science & Engineering 235: Discrete Mathematics Christopher M. Bourke cbourke@cse.unl.edu Graph theory was introduced in the 18th century by Leonhard Euler via the Königsberg
More informationOn Jeśmanowicz Conjecture Concerning Pythagorean Triples
Journal of Mathematical Research with Applications Mar., 2015, Vol. 35, No. 2, pp. 143 148 DOI:10.3770/j.issn:2095-2651.2015.02.004 Http://jmre.dlut.edu.cn On Jeśmanowicz Conjecture Concerning Pythagorean
More informationExtended and generalized weight enumerators
Extended and generalized weight enumerators Relinde Jurrius Ruud Pellikaan Eindhoven University of Technology, The Netherlands International Workshop on Coding and Cryptography, 2009 1/23 Outline Previous
More informationQED Q: Why is it called the triangle inequality? A: Analogue with euclidean distance in the plane: picture Defn: Minimum Distance of a code C:
Lecture 3: Lecture notes posted online each week. Recall Defn Hamming distance: for words x = x 1... x n, y = y 1... y n of the same length over the same alphabet, d(x, y) = {1 i n : x i y i } i.e., d(x,
More informationSome Results on the Incidence Coloring Number of Chordal Rings *
Some Results on the Incidence Coloring Number of Chordal Rings * Kung-Fu Ding, Kung-Jui Pai,+ and Ro-Yu Wu Department of Industrial Engineering and Management, Ming Chi University of Technology, New Taipei
More information2.2 Set Operations. Introduction DEFINITION 1. EXAMPLE 1 The union of the sets {1, 3, 5} and {1, 2, 3} is the set {1, 2, 3, 5}; that is, EXAMPLE 2
2.2 Set Operations 127 2.2 Set Operations Introduction Two, or more, sets can be combined in many different ways. For instance, starting with the set of mathematics majors at your school and the set of
More informationChapter 3: Theory of Modular Arithmetic 1. Chapter 3: Theory of Modular Arithmetic
Chapter 3: Theory of Modular Arithmetic 1 Chapter 3: Theory of Modular Arithmetic SECTION A Introduction to Congruences By the end of this section you will be able to deduce properties of large positive
More informationPolyominoes and Polyiamonds as Fundamental Domains for Isohedral Tilings of Crystal Class D 2
Symmetry 2011, 3, 325-364; doi:10.3390/sym3020325 OPEN ACCESS symmetry ISSN 2073-8994 www.mdpi.com/journal/symmetry Article Polyominoes and Polyiamonds as Fundamental Domains for Isohedral Tilings of Crystal
More informationTrail Making Game. Hyun Sung Jun Jaehoon Kim Sang-il Oum Department of Mathematical Sciences KAIST, Daejeon, , Republic of Korea.
Trail Making Game Hyun Sung Jun Jaehoon Kim Sang-il Oum Department of Mathematical Sciences KAIST, Daejeon, 305-701, Republic of Korea. May 7, 2009 Abstract Trail Making is a game played on a graph with
More informationPolyominoes and Polyiamonds as Fundamental Domains for Isohedral Tilings of Crystal Class D 2
Symmetry 2011, 3, 325-364; doi:10.3390/sym3020325 OPEN ACCESS symmetry ISSN 2073-8994 www.mdpi.com/journal/symmetry Article Polyominoes and Polyiamonds as Fundamental Domains for Isohedral Tilings of Crystal
More informationAlgorithmic number theory Cryptographic hardness assumptions. Table of contents
Algorithmic number theory Cryptographic hardness assumptions Foundations of Cryptography Computer Science Department Wellesley College Fall 2016 Table of contents Introduction Primes and Divisibility Modular
More informationIs there a McLaughlin geometry?
Is there a McLaughlin geometry? Leonard H. Soicher School of Mathematical Sciences Queen Mary, University of London Mile End Road, London E1 4NS, UK email: L.H.Soicher@qmul.ac.uk February 9, 2006 Dedicated
More informationTrees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph.
Trees 1 Introduction Trees are very special kind of (undirected) graphs. Formally speaking, a tree is a connected graph that is acyclic. 1 This definition has some drawbacks: given a graph it is not trivial
More informationMinimum Number of Palettes in Edge Colorings
Graphs and Combinatorics (2014) 30:619 626 DOI 10.1007/s00373-013-1298-8 ORIGINAL PAPER Minimum Number of Palettes in Edge Colorings Mirko Horňák Rafał Kalinowski Mariusz Meszka Mariusz Woźniak Received:
More informationarxiv:cs/ v1 [cs.it] 8 Feb 2007
Permutation Decoding and the Stopping Redundancy Hierarchy of Linear Block Codes Thorsten Hehn, Olgica Milenkovic, Stefan Laendner, Johannes B. Huber Institute for Information Transmission, University
More informationA note on the number of edges guaranteeing a C 4 in Eulerian bipartite digraphs
A note on the number of edges guaranteeing a C 4 in Eulerian bipartite digraphs Jian Shen Department of Mathematics Southwest Texas State University San Marcos, TX 78666 email: js48@swt.edu Raphael Yuster
More informationSEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION
CHAPTER 5 SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION Copyright Cengage Learning. All rights reserved. SECTION 5.5 Application: Correctness of Algorithms Copyright Cengage Learning. All rights reserved.
More informationEDGE-COLOURED GRAPHS AND SWITCHING WITH S m, A m AND D m
EDGE-COLOURED GRAPHS AND SWITCHING WITH S m, A m AND D m GARY MACGILLIVRAY BEN TREMBLAY Abstract. We consider homomorphisms and vertex colourings of m-edge-coloured graphs that have a switching operation
More informationOn Soft Topological Linear Spaces
Republic of Iraq Ministry of Higher Education and Scientific Research University of AL-Qadisiyah College of Computer Science and Formation Technology Department of Mathematics On Soft Topological Linear
More informationCSE 20 DISCRETE MATH. Winter
CSE 20 DISCRETE MATH Winter 2017 http://cseweb.ucsd.edu/classes/wi17/cse20-ab/ Final exam The final exam is Saturday March 18 8am-11am. Lecture A will take the exam in GH 242 Lecture B will take the exam
More informationMATH 423 Linear Algebra II Lecture 17: Reduced row echelon form (continued). Determinant of a matrix.
MATH 423 Linear Algebra II Lecture 17: Reduced row echelon form (continued). Determinant of a matrix. Row echelon form A matrix is said to be in the row echelon form if the leading entries shift to the
More informationRevisiting the bijection between planar maps and well labeled trees
Revisiting the bijection between planar maps and well labeled trees Daniel Cosmin Porumbel September 1, 2014 Abstract The bijection between planar graphs and well labeled trees was published by Cori and
More informationThe simplex method and the diameter of a 0-1 polytope
The simplex method and the diameter of a 0-1 polytope Tomonari Kitahara and Shinji Mizuno May 2012 Abstract We will derive two main results related to the primal simplex method for an LP on a 0-1 polytope.
More informationThe strong chromatic number of a graph
The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same
More informationOn the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments
Electronic Journal of Graph Theory and Applications 3 (2) (2015), 191 196 On the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments Rafael Del Valle
More informationEC500. Design of Secure and Reliable Hardware. Lecture 9. Mark Karpovsky
EC500 Design of Secure and Reliable Hardware Lecture 9 Mark Karpovsky 1 1 Arithmetical Codes 1.1 Detection and Correction of errors in arithmetical channels (adders, multipliers, etc) Let = 0,1,,2 1 and
More informationComputing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes
Computing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes Marta Pujol and Mercè Villanueva Combinatorics, Coding and Security Group (CCSG) Universitat Autònoma de Barcelona (UAB) VIII JMDA, Almería
More informationCharacterizing Finite Frobenius Rings Via Coding Theory
Characterizing Finite Frobenius Rings Via Coding Theory Jay A. Wood Department of Mathematics Western Michigan University http://homepages.wmich.edu/ jwood/ Algebra and Communications Seminar University
More informationBalanced Degree-Magic Labelings of Complete Bipartite Graphs under Binary Operations
Iranian Journal of Mathematical Sciences and Informatics Vol. 13, No. 2 (2018), pp 1-13 DOI: 10.7508/ijmsi.2018.13.001 Balanced Degree-Magic Labelings of Complete Bipartite Graphs under Binary Operations
More informationGENERALIZED TRACEABILITY CODES
U.P.B. Sci. Bull., Series A, Vol. 78, Iss. 2, 2016 ISSN 1223-7027 GENERALIZED TRACEABILITY CODES Majid MAZROOEI 1, Ali ZAGHIAN 2 In this paper, we introduce generalizations of frameproof, secure frameproof,
More informationDefinition: A graph G = (V, E) is called a tree if G is connected and acyclic. The following theorem captures many important facts about trees.
Tree 1. Trees and their Properties. Spanning trees 3. Minimum Spanning Trees 4. Applications of Minimum Spanning Trees 5. Minimum Spanning Tree Algorithms 1.1 Properties of Trees: Definition: A graph G
More informationRectangular Matrix Multiplication Revisited
JOURNAL OF COMPLEXITY, 13, 42 49 (1997) ARTICLE NO. CM970438 Rectangular Matrix Multiplication Revisited Don Coppersmith IBM Research, T. J. Watson Research Center, Yorktown Heights, New York 10598 Received
More informationMath 5593 Linear Programming Lecture Notes
Math 5593 Linear Programming Lecture Notes Unit II: Theory & Foundations (Convex Analysis) University of Colorado Denver, Fall 2013 Topics 1 Convex Sets 1 1.1 Basic Properties (Luenberger-Ye Appendix B.1).........................
More informationProperly Colored Paths and Cycles in Complete Graphs
011 ¼ 9 È È 15 ± 3 ¾ Sept., 011 Operations Research Transactions Vol.15 No.3 Properly Colored Paths and Cycles in Complete Graphs Wang Guanghui 1 ZHOU Shan Abstract Let K c n denote a complete graph on
More informationMath 776 Graph Theory Lecture Note 1 Basic concepts
Math 776 Graph Theory Lecture Note 1 Basic concepts Lectured by Lincoln Lu Transcribed by Lincoln Lu Graph theory was founded by the great Swiss mathematician Leonhard Euler (1707-178) after he solved
More informationCombinatorial Enumeration of Partitions of a Convex Polygon
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 18 2015, Article 15.9.4 Combinatorial Enumeration of Partitions of a Convex Polygon Dong Zhang and Dongyi Wei Peking University Beijing 100871 P. R.
More informationZero forcing propagation time on oriented graphs
Zero forcing propagation time on oriented graphs Adam Berliner a, Chassidy Bozeman b, Steve Butler b,, Minerva Catral c, Leslie Hogben b,d, Brenda Kroschel e, Jephian Chin-Hung Lin b, Nathan Warnberg f,
More informationA Method for Construction of Orthogonal Arrays 1
Eighth International Workshop on Optimal Codes and Related Topics July 10-14, 2017, Sofia, Bulgaria pp. 49-54 A Method for Construction of Orthogonal Arrays 1 Iliya Bouyukliev iliyab@math.bas.bg Institute
More informationSCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics. Numbers & Number Systems
SCHOOL OF ENGINEERING & BUILT ENVIRONMENT Mathematics Numbers & Number Systems Introduction Numbers and Their Properties Multiples and Factors The Division Algorithm Prime and Composite Numbers Prime Factors
More informationProgress Towards the Total Domination Game 3 4 -Conjecture
Progress Towards the Total Domination Game 3 4 -Conjecture 1 Michael A. Henning and 2 Douglas F. Rall 1 Department of Pure and Applied Mathematics University of Johannesburg Auckland Park, 2006 South Africa
More informationOn Shanks Algorithm for Modular Square Roots
On Shanks Algorithm for Modular Square Roots Jan-Christoph Schlage-Puchta 29 May 2003 Abstract Let p be a prime number, p = 2 n q +1, where q is odd. D. Shanks described an algorithm to compute square
More informationSparse Hypercube 3-Spanners
Sparse Hypercube 3-Spanners W. Duckworth and M. Zito Department of Mathematics and Statistics, University of Melbourne, Parkville, Victoria 3052, Australia Department of Computer Science, University of
More informationMulti-matrices and arithmetical operations with multi-matrices
1 Multi-matrices and arithmetical operations with multi-matrices Constantin Scheau National College M. Viteazul, Ploiesti, Romania c_scheau@yahoo.com Abstract. The multi-space structure has been defined
More informationDISCRETE MATHEMATICS
DISCRETE MATHEMATICS WITH APPLICATIONS THIRD EDITION SUSANNA S. EPP DePaul University THOIVISON * BROOKS/COLE Australia Canada Mexico Singapore Spain United Kingdom United States CONTENTS Chapter 1 The
More information1 Elementary number theory
1 Elementary number theory We assume the existence of the natural numbers and the integers N = {1, 2, 3,...} Z = {..., 3, 2, 1, 0, 1, 2, 3,...}, along with their most basic arithmetical and ordering properties.
More informationON THE EMPTY CONVEX PARTITION OF A FINITE SET IN THE PLANE**
Chin. Ann. of Math. 23B:(2002),87-9. ON THE EMPTY CONVEX PARTITION OF A FINITE SET IN THE PLANE** XU Changqing* DING Ren* Abstract The authors discuss the partition of a finite set of points in the plane
More informationLecture 1. 1 Notation
Lecture 1 (The material on mathematical logic is covered in the textbook starting with Chapter 5; however, for the first few lectures, I will be providing some required background topics and will not be
More informationSlides for Faculty Oxford University Press All rights reserved.
Oxford University Press 2013 Slides for Faculty Assistance Preliminaries Author: Vivek Kulkarni vivek_kulkarni@yahoo.com Outline Following topics are covered in the slides: Basic concepts, namely, symbols,
More informationFOUR EDGE-INDEPENDENT SPANNING TREES 1
FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem
More informationRamsey s Theorem on Graphs
Ramsey s Theorem on Graphs 1 Introduction Exposition by William Gasarch Imagine that you have 6 people at a party. We assume that, for every pair of them, either THEY KNOW EACH OTHER or NEITHER OF THEM
More informationComponent Connectivity of Generalized Petersen Graphs
March 11, 01 International Journal of Computer Mathematics FeHa0 11 01 To appear in the International Journal of Computer Mathematics Vol. 00, No. 00, Month 01X, 1 1 Component Connectivity of Generalized
More informationHashing. Yufei Tao. Department of Computer Science and Engineering Chinese University of Hong Kong
Department of Computer Science and Engineering Chinese University of Hong Kong In this lecture, we will revisit the dictionary search problem, where we want to locate an integer v in a set of size n or
More informationTesting Isomorphism of Strongly Regular Graphs
Spectral Graph Theory Lecture 9 Testing Isomorphism of Strongly Regular Graphs Daniel A. Spielman September 26, 2018 9.1 Introduction In the last lecture we saw how to test isomorphism of graphs in which
More informationTHE COMMUTATOR SUBGROUPS OF THE ALTERNATING KNOT GROUPS
PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 28, No. 1, April 1971 THE COMMUTATOR SUBGROUPS OF THE ALTERNATING KNOT GROUPS KUNIO MURASUGI Abstract. The aim of this paper is to show that the
More informationCUT VERTICES IN ZERO-DIVISOR GRAPHS OF FINITE COMMUTATIVE RINGS
CUT VERTICES IN ZERO-DIVISOR GRAPHS OF FINITE COMMUTATIVE RINGS M. AXTELL, N. BAETH, AND J. STICKLES Abstract. A cut vertex of a connected graph is a vertex whose removal would result in a graph having
More informationA generalization of zero divisor graphs associated to commutative rings
Proc. Indian Acad. Sci. (Math. Sci.) (2018) 128:9 https://doi.org/10.1007/s12044-018-0389-0 A generalization of zero divisor graphs associated to commutative rings M. AFKHAMI 1, A. ERFANIAN 2,, K. KHASHYARMANESH
More information